MGMT Chapter 12
________ is the amount of data that can be transmitted across a transmission medium measured in bits per second.
Bandwidth
Which of the following is used to increase security on a client/server network?
Bastion host
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.
Brute force attack
In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.
Bus
Which of the following is NOT a common network topology?
Cluster
Which server would a client/server network include to control data exchanges with other networks?
Communications
Which of the following is NOT an advantage of installing a network in a business?
Decentralization of files and data
Fiber-optic cable most likely would be used in a business network when?
Electrical or magnetic interference is present
A proxy server is used to host websites on a client/server network.
FALSE
MAC adapters perform specific tasks to enable nodes to communicate on a network.
FALSE
Most modern operating systems do not include some type of NOS functionality.
FALSE
Ring topologies are the most widely used topology.
FALSE
________ cable is NOT subject to electromagnetic interference or radio frequency interference.
Fiber-Optic
Which network cable type is virtually immune to signal interference?
Fiber-optic
A(n) ________ server is a server that stores and manages files for network users.
File
A ________ topology uses more than one type of topology when building a network.
Hybrid
Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers?
Intranet
A MAC address...
Is used for internal identification purposes on a network
Network adapters send data packets based on a(n)
MAC address
A ________ is a group of two or more computers, or nodes, configured to share information and resources.
Network
NOS software is needed
On all computers in a client/server network
A network consisting of devices used by a single person connected via wireless media is a
PAN
For business networks, which of the following is NOT one of the main cable types?
Polyvinyl
Providing adequate security on a corporate network involves all of the following issues EXCEPT
Proprietary software encryption
A network ________ is a set of rules for how information and communications are exchanged.
Protocol
Which topology tends to provide the fairest allocation of network resources?
Ring
On Client/Server networks, bridges...
Route data between two collision domains on a single network
A ________ sends information between two networks.
Router
On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network
Scalability
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.
Screening
Which of the following is the most commonly used client/server network topology?
Star
Switches are used to send data on a specific route through an internal network.
TRUE
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.
Terminator
Which is NOT a key component of a typical client/server network?
Terminator
Why are client/server networks usually installed in businesses?
They are more scalable than P2P networks
The process whereby users prove they have authorization to use a computer network is known as
Authentication
To manage authorized connections to internal networks, which server would a client/server network include?
Authentication
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.
Authentication
Which of the following is NOT a major factor to consider when selecting network cabling?
Cable diameter
A ________ network can contain servers as well as individual computers.
Client/Server
Which of the following is an advantage of installing a client/server network in a business?
Decentralization of files and data
A(n) ________ address is the address that external entities use when communicating with your network.
IP
The physical address assigned to each network adapter is called its ________ address.
Media access control (MAC)
The physical or logical arrangement of computers, transmission media (cables), and other network components is known as network
Topology
A ________ uses the Internet communications infrastructure to build a secure and private network.
VPN