chapter 12

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A(n) ________ server is a server that stores and manages files for network users -database -print -file -e-mail

file

A ________ keeps your computer safe by determining who is trying to access it. -hub -firewall -switch -gateway

firewall

Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers? -PAN -WAN -intranet -VPN

intranet

A MAC address -is only used on Apple computers. -is the same thing as an IP address. -is the address external entities use to communicate with your network. -is used for internal identification purposes on a network.

is used for the internal identification purposes on a network

In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal. -hit -crash -jam -stop

jam

The physical address assigned to each network adapter is called its ________ address. -physical address control (PAC) -media access control (MAC) -network physical address (NPA) -network access control (NAC)

media access control(MAC)

A ________ is a group of two or more computers, or nodes, configured to share information and resources. -bus -bridge -router -network

network

NOS software is needed -only if a communications server is deployed on a client/server network. -only when configuring a network in a star topology. -on all computers in a client/server network. -only on the servers in a client/server network.

on all computers in a client/server network

A network consisting of devices used by a single person connected via wireless media is a -MAN. -LAN. -PAN. -WAN.

pan

In a ________ network, each node connected to the network communicates directly with every other node. -router -client/server -bridge -peer-to-peer

peer-to-peer

Providing adequate security on a corporate network involves all of the following issues EXCEPT -restricting access to servers. -authentication. -proprietary software encryption. -limiting physical access to networking equipment.

proprietary software encryption

The physical or logical arrangement of computers, transmission media (cables), and other network components is known as network -blueprint. -topology. -domain. -protocol.

topology

Switches are used to send data on a specific route through an internal network

true

Most wired home networks use ________ cable, which is most susceptible to interference -coaxial -Wi-Fi -unshielded twisted-pair -fiber-optic

unshielded twisted-pair

Network adapters send data packets based on a(n) -router address. -frame address. -IP address. -MAC address.

MAC address

Why are client/server networks usually installed in businesses? -Security is weaker on client/server networks. -Client/server networks are cheaper to install. -They do not require dedicated servers like P2P networks. -They are more scalable than P2P networks.

They are more scalable than P2P networks

________ is the amount of data that can be transmitted across a transmission medium measured in bits per second. -Bandwidth -Data capacity -Infusion -Scalability

bandwidth

Which of the following is used to increase security on a client/server network? -bastion host -bridge -transmission media -database server

bastion host

A ________ sends data from one collision domain to another. -switch -router -bridge -link

bridge

Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________. -brute force attack -Trojan horse -worm -spammer

brute force attack

Which of the following is NOT a common network topology? -Ring -Linear bus -Star -Cluster

cluster

Which server would a client/server network include to control data exchanges with other networks? -authentication -communications -application -database

communications

Which of the following is NOT an advantage of installing a network in a business? -enables peripheral sharing -decentralization of files and data -centralization of files and data -enables software sharing

decentralization of files and data

Fiber-optic cable most likely would be used in a business network when -saving money is more important than speed. -electrical or magnetic interference is present. -the installation budget is very limited. -very short cable runs are required.

electrical or magnetic interference is present

________ is the standard communications protocol used on most client/server networks. -NOS -Mac -VPN -Ethernet

ethernet

A proxy server is used to host websites on a client/server network.

false

MAC adapters perform specific tasks to enable nodes to communicate on a network.

false

Most modern operating systems do not include some type of NOS functionality.

false

Ring topologies are the most widely used topology.

false

Which network cable type is virtually immune to signal interference? -UTP -coaxial -fiber-optic -STP

fiber optic

________ cable is NOT subject to electromagnetic interference or radio frequency interference. -Coaxial -Twisted-pair -Fiber-optic -Polycarbonate

fiber-optic

A ________ uses the Internet communications infrastructure to build a secure and private network. -HAN -PAN -WAN -VPN

VPN

The process whereby users prove they have authorization to use a computer network is known as -decentralization. -repudiation. -proxy control. -authentication.

authentication

To manage authorized connections to internal networks, which server would a client/server network include? -database -communications -application -authentication

authentication

A network ________ is a set of rules for how information and communications are exchanged. -frame -packet -protocol -token

protocol

Which topology tends to provide the fairest allocation of network resources? -VPN -bus -star -ring

ring

On client/server networks, bridges -move data efficiently from node to node on the internal network. -transfer data between two networks. -are necessary only in networks using the ring topology. -route data between two collision domains on a single network.

route data between two collision domains on a single network

A ________ sends information between two networks. -bridge -switch -router -repeater

router

On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network -decentralization. -topology. -scalability. -flexibility.

scalaility

Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network -examination -scanning -viewing -screening

screening

Which of the following is an advantage of installing a client/server network in a business? -sharing of peripherals -decentralization of peripherals -centralization of network adapters -decentralization of files and data

sharing of peripherals

A print server uses a print ________ as a software holding area for jobs waiting to be printed -stack -heap -logger -spooler

spooler

The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals. -endcap -terminator -block -stopper

terminator

Which is NOT a key component of a typical client/server network? -terminator -network navigation devices -NOS -transmission media

terminator

Ring networks use the ________ method to avoid data collisions. -token -passive-check -active-check -packet screening

token


Ensembles d'études connexes

ถาม-ตอบ พรบ ศุลกากร ชุดที่ 1

View Set

Health Law Concepts and Compliance - Ch 3

View Set

Chapter 19: PrepU - Conditions Existing Before Conception

View Set

Lesson 2 The First Global Economic Systems

View Set

RN Fundamentals content mastery practice test

View Set

Chapter 2 Test Psychological Assessments

View Set

Intermediate Accounting - Chapter 3 SB

View Set

Cellular adaptation, injury and death

View Set

Abnormal Psychology Test 1 Review

View Set