Chapter 12
which of the following is a private network setup by a business thats exclusively used by a select group of employers and suppliers
intranet
a MAC address
is used for internal identification purposes on a network
NOS software is needed
on all computers in a client/server network
Providing adequate security on a corporate network involves all of the following issues EXCEPT
proprietary software encryption
the physical or logical arrangement of computers, transmission media (cables) and other network components is known as a network
topology
MAC adapters perform specific tasks to enable nodes to communicate of a network
False
a proxy server is used to hose websites on a client/server network
False
most modern operating systems do not include some type of NOS functionality
False
ring topologies are the most widely used topology
False
network adapters send data packets based on a
MAC address
a network consisting of devices used by a single person connected via wireless media is a
PAN
To manage authorized connections to internet networks which server would a client/server network include
authentication
Which server would a client/server network include to control data exchanges with other networks
communications
Which of the following is not an advantage of installing a network in a business
decentralization of files and data
fiber optic cables most likely would be used in a business network when
electrical or magnetic interference is present
Which network cable is virtually immune to signal interference
fiber optic
Switches are used to send data on a specific route through an internal network
True
The process whereby users prove they have authorization to use a computer network is known as
authentication
which topology tens to provide the fairest allocation of network resources
ring
on client/server networks, bridges
route data between two collisions domains on a single network
on client/server networks more users can be added without affecting the performance of other nodes. This is known as network
scalability
Which of the following is used to increase security on a client/server network in a business
sharing of peripherals
which is NOT a key component of a typical client/server network
terminator
why are client/server networks usually installed in businesses
they are more scalable than P2P networks