Business Management Chapter 12 Questions
A ________ topology uses more than one type of topology when building a network.
hybrid
Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers?
intranet
A MAC address
is used for internal identification purposes on a network.
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
jam
NOS software is needed
on all computers in a client/server network
In a ________ network, each node connected to the network communicates directly with every other node.
peer-to-peer
The physical or logical arrangement of computers, transmission media (cables), and other network components is known as network
topology
Most wired home networks use ________ cable, which is most susceptible to interference.
unshielded twisted-pair
________ is the amount of data that can be transmitted across a transmission medium measured in bits per second.
Bandwith
Which of the following is NOT a common network topology?
Cluster
A proxy server is used to host websites on a client/server network.
False
MAC adapters perform specific tasks to enable nodes to communicate on a network.
False
Most modern operating systems do not include some type of NOS functionality.
False
Ring topologies are the most widely used topology.
False
________ cable is NOT subject to electromagnetic interference or radio frequency interference.
Fiber-optic
A(n) ________ address is the address that external entities use when communicating with your network.
IP
The computers in a lab on a floor of a building would be connected using a ________.
LAN
Network adapters send data packets based on a(n)
MAC address
A network consisting of devices used by a single person connected via wireless media is a
PAN
For business networks, which of the following is NOT one of the main cable types?
Polyvinyl
Why are client/server networks usually installed in businesses?
They are more scalable than P2P networks.
A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall.
bastion host
Which of the following is used to increase security on a client/server network?
bastion host
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.
brute force attack
Which of the following is NOT a major factor to consider when selecting network cabling?
cable diameter
Which server would a client/server network include to control data exchanges with other networks?
communications
Which of the following is NOT an advantage of installing a network in a business?
decentralization of files and data
Fiber-optic cable most likely would be used in a business network when
electrical or magnetic interference is present.
Which network cable type is virtually immune to signal interference?
fiber-optic
Switches are used to send data on a specific route through an internal network.
True
A ________ uses the Internet communications infrastructure to build a secure and private network.
VPN
Cars often have ________ connectivity.
Wi-Fi and Bluetooth
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.
authentication
The process whereby users prove they have authorization to use a computer network is known as
authentication
To manage authorized connections to internal networks, which server would a client/server network include?
authentication
Providing adequate security on a corporate network involves all of the following issues EXCEPT
proprietary software encryption.
A network ________ is a set of rules for how information and communications are exchanged.
protocol
Which topology tends to provide the fairest allocation of network resources?
ring
On client/server networks, bridges
route data between two collision domains on a single network.
A ________ sends information between two networks.
router
On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network
scalability
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.
screening
Which of the following is an advantage of installing a client/server network in a business?
sharing of peripherals
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.
terminator
Which is NOT a key component of a typical client/server network?
terminator