Chapter 12

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

which of the following is a private network setup by a business thats exclusively used by a select group of employers and suppliers

intranet

a MAC address

is used for internal identification purposes on a network

NOS software is needed

on all computers in a client/server network

Providing adequate security on a corporate network involves all of the following issues EXCEPT

proprietary software encryption

the physical or logical arrangement of computers, transmission media (cables) and other network components is known as a network

topology

MAC adapters perform specific tasks to enable nodes to communicate of a network

False

a proxy server is used to hose websites on a client/server network

False

most modern operating systems do not include some type of NOS functionality

False

ring topologies are the most widely used topology

False

network adapters send data packets based on a

MAC address

a network consisting of devices used by a single person connected via wireless media is a

PAN

To manage authorized connections to internet networks which server would a client/server network include

authentication

Which server would a client/server network include to control data exchanges with other networks

communications

Which of the following is not an advantage of installing a network in a business

decentralization of files and data

fiber optic cables most likely would be used in a business network when

electrical or magnetic interference is present

Which network cable is virtually immune to signal interference

fiber optic

Switches are used to send data on a specific route through an internal network

True

The process whereby users prove they have authorization to use a computer network is known as

authentication

which topology tens to provide the fairest allocation of network resources

ring

on client/server networks, bridges

route data between two collisions domains on a single network

on client/server networks more users can be added without affecting the performance of other nodes. This is known as network

scalability

Which of the following is used to increase security on a client/server network in a business

sharing of peripherals

which is NOT a key component of a typical client/server network

terminator

why are client/server networks usually installed in businesses

they are more scalable than P2P networks


Ensembles d'études connexes

1: Completing the Application, Underwriting, and Delivering the Policy

View Set

Alcoholism Final Problem Questions

View Set

Chapter 11 Principles of Pharmacology

View Set

Chapter 18: Questioned Documents

View Set