Lesson 25
Simon tells the board that he uses a ____ as an intermediary between a user and the Internet, ensuring security, administrative control, and caching service.
proxy server
Most WANs consists of 2 or more LANs and are connected by ____.
routers
An ____ is hardware ( a computer) that can be used to share mail, databases, and more.
server
____ operating systems provide network control and include special functions for connecting computers and other devices.
server
Ali learns that ____ is highspeed Internet access.
Broadband
____ consist of special hardware and software that protects an internal network from external networks.
Firewalls
Which of the following is not a classification type of network?
LAN
Simon tells the board that his department does all of the following, Except ____.
Occasionally run antivirus software in order to protect data and programs.
The figure above shows examples of a(n) ____ network.
Peer-to-peer
Which of the following is not true about connecting to the internet?
A DSL can carry data, but not voice
Which of the following is not true about network risks?
A standalone system is vulnerable to the same risks as networked computers.
Which of the following is not a type of server operating system?
Adobe Dreamweaver
Which of the following types of networks use IP technology?
All the above
Which of the following is true about the benefits of networking?
All the above are true
An ____ is a software program such as Internet Explorer.
Client
Which of the following is not true about the networks shown in the figure above?
Designed for the exclusive use of people within an organization.
Which of the following is not an example of malicious code?
Hackers
Ali learns that all of the following are true except ____.
Sniffer software devices are usually external devices, not built in.
PSTN stand for Public Switched ____ Network.
Telephone
Which of the following is not true about network security?
The most common form of restricting access to data is biometrics.