TIA Ch. 12

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A(n) ________ server is a server that stores and manages files for network users.

File

A ________ keeps your computer safe by determining who is trying to access it.

Firewall

A ________ topology uses more than one topology when building a network.

Hybrid

A(n) ________ address is the address that external entities use when communicating with your network

IP

In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.

Jam

The computers in a lab on a floor of a building would be connected using a ________.

LAN

Network adapters send data packets based on a(n)

MAC address

The physical address assigned each network adapter is called its ________.

Media Access Control (MAC)

A ________ is a group of two or more computers, or nodes, designed to share information and resources

Network

NOS software is needed

On all computers in a client/server network

In a ________ network, each node connected to the network communicates directly with every other node.

Peer-to-peer

Providing adequate security on a corporate network involves all of the following issues except

Proprietary software lockout

A ________ sends data between two networks.

Router

Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network

Screening

Why are P2P networks not usually installed in businesses?

Security is stronger on client/server networks

Most home networks use ________ cable, which is most susceptible to interference.

Unshielded twisted pair

A ________ uses the Internet communications infrastructure to build a secure and private network.

VPN

A network consisting of two LANs separated by great physical distances is known as a

WAN

Correctly entering the user ID and password on your college network is an example of

Authentication

To ensure only authorized users are logging onto a network, which server would a client/server network include?

Authentication

________ is the amount of data that can be transmitted across a transmission medium in a certain amount of time.

Bandwidth

A(n) ________ server is a heavily secured server located between a company's secure internal network and its firewall.

Bastion host

Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.

Brute force attack

To manage authorized connections to external networks, which server would a client/server network include?

Communications

Fiber-optic cable most likely would be used in a business network when

Electrical or magnetic interference is present

________ is the standard communications protocol used on most client/server networks.

Ethernet

Bridges are used to route data between two different networks. (T/F)

False

Client/server networks are generally less secure than P2P networks. (T/F)

False

A print server uses a print ________ as a software holding area for jobs waiting to be printed.

Spooler

Which type of network topology is most popular?

Star

Why are client/server networks usually installed in businesses?

They are more scalable than P2P networks

On client/server networks, routers

Transfer data between two networks

A web server is used to host websites on a client/server network. (T/F)

True

Most modern operating systems include some type of NOS functionality (T/F)

True

Cars often have ________ networks

Wifi and Bluetooth

Which of the following is NOT a factor to consider when selecting network cabling? a. Cable diameter b. Maximum run length c. Interference d. Bandwidth

a

Which of the following is not an advantage of installing a network in a business? a. decentralization of files and data b. centralization of files and data c. enables software sharing d. enables peripheral sharing

a

Which of the following is an advantage of installing a client/server network in a business? (1 point) a. decentralization of files and data b. centralization of network adapters c. centralization of network security protection d. decentralization of peripherals

c

Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers? a. Vendor network b. HAN c. MAN d. Intranet

d

Which of the following is used to increase security on a client/server network? a. bridge b. database server c. transmission media d. bastion host

d


Ensembles d'études connexes

Chapter 5 Junior Vocab - Intro to The Lodging Industry

View Set

Investments Test Bank Missed Q's 1

View Set

Autism & Cerebral Palsy ATI practice

View Set

AP2 Reproduction Menstrual Cycle Steele Buie

View Set

Human A&P Terms for the FINAL : Be able to define or describe each of the following. I will randomly choose 50 of these in which you will need to define

View Set