CHAPTER 12

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

________ is the amount of data that can be transmitted across a transmission medium in a certain amount of time.

Bandwidth

A bridge sends information between two networks.

FALSE

The computers in a lab on a floor of a building would be connected using a ________.

LAN

a network in a small geographic area

LAN

used for internal identification on a network

MAC address

an operating system for network servers

NOS

network in which each node connected to the network communicates directly with every other node

P2P

used by a single individual connecting devices using wireless media

PAN

________ interference is a type of network interference for cable transmission media that can be caused by nearby television or radio signals.

Radio frequency/RF

________ means that additional users can easily be added without affecting the performance of the other network nodes.

Scalability

A print server uses a print ________ as a software holding area for jobs waiting to be printed.

Spooler

A facial-recognition scanner is an example of a biometric authentication device.

TRUE

Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.

TRUE

In an active topology, each node helps to move data through a network.

TRUE

Since data transmissions can pass through fiber-optic cable in only one direction, at least two fibers are required to enable transmission of data in both directions.

TRUE

Transmission media comprise the physical system that data take to flow between devices on the network.

TRUE

________ technology places data packets inside other data packets.

Tunneling

A(n) ________ is made up of two or more LANs that are miles apart.

WAN

network of two or more LANs

WAN

A(n) ________ server is used to host an Internet site.

Web

A(n) ________ is a device that reads information from a magnetic strip on the back of a credit card-like identification card.

access card reader/card reader

acts as a repository for application software

application

A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.

authentication

A ________ sends data from one collision domain to another.

bridge

sends data between different collision domains

bridge

Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.

brute force attack

A(n) ________ is used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters.

intranet

In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.

jam

A ring topology is also known as a(n) ________ topology.

loop

The physical address assigned each network adapter is called its ________.

media access control (MAC)

A ________ is a group of two or more computers, or nodes, designed to share information and resources.

network

NIC stands for ________.

network interface card

Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.

screening

makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node

switch

A ________ network can contain servers as well as individual computers.

client/server

A(n) ________ server is maintained by a hosting company and is connected to networks using the Internet.

cloud

a server not physically located at a company's site

cloud

A(n) ________ is an area of an intranet to which only certain corporations or individuals can access.

extranet

A(n) ________ cable contains a glass or plastic core.

fiber-optic

A(n) ________ server is a server that stores and manages files for network users.

file

A ________ keeps your computer safe by determining who is trying to access it.

firewall

software or hardware that prevents unauthorized entry

firewall

A(n) ________ is a group of data packets that are sent together.

frame

holds multiple data packets

frame

computer system designed to attract unauthorized users

honey pot

Ring networks use the ________ method to avoid data collisions.

token

special type of data packet

token

________ is the process that requires users to prove that they have permission to access a computer network.

Authentication

In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.

Bus

method used on Ethernet networks to avoid data collisions

CSMA/CD

Which of the following is NOT a factor to consider when selecting network cabling?

Cable diameter

Which of the following is NOT a common network topology?

Cluster

A library book reservation service is a good example of a use for a(n) ________ server.

Database

For business networks, which of the following is NOT a main cable type?

Duplex

Fluorescent lights and machinery with motors or transformers are common sources of ________ emissions.

Electromagnetic interference/EMI

________ is the standard communications protocol used on most client/server networks.

Ethernet

A phishing attack is an attempt to access an account by repeatedly trying different passwords.

FALSE

An international company like Microsoft would use a MAN to connect all of its computers.

FALSE

Data flows in both directions in a ring network.

FALSE

In a client/server network, each network node communicates directly with every other node on the network.

FALSE

MAC addresses and IP addresses are the same thing.

FALSE

MAC addresses are restricted to Macintosh computers.

FALSE

P2P networks become difficult to manage when they exceed five users.

FALSE

Worms often try to disguise from where they are sending data by using a bogus IP addresses instead of using an authorized IP address belonging to the network.

FALSE

________ cable is NOT subject to electromagnetic interference or radio frequency interference.

Fiber-optic

________ cable is the most costly to install.

Fiber-optic

can be used for a small home-based business

HAN

A(n) ________ address is the address that external entities use when communicating with your network.

IP

links users in a specific geographic area (usually a city)

MAN

adapter card that connects a computer to a network

NIC

Which of the following is the most commonly used client/server network topology?

Star

Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.

TRUE

A ________ uses the Internet communications infrastructure to build a secure and private network.

VPN

keeps track of user logins to the network and which services are available to each user

authentication

A(n) ________ server is a heavily secured server located between a company's secure internal network and its firewall.

bastion host

Retinal scanning is an example of ________ authentication.

biometric

allows client computers to access a database

database

A(n) ________ server is a server used to fulfill one specific purpose.

dedicated

A ________ topology uses more than one topology when building a network.

hybrid

data broken into a small segment with an address to which it is sent

packet

A(n) ________ network is often the type of network that is set up in a home or very small business.

peer-to-peer

In a ________ network, each node connected to the network communicates directly with every other node.

peer-to-peer

Identification badges and smart keys are examples of ________ objects that users carry to identify themselves and that allow them access to a computer system or computer facility.

possessed

A ________ is a set of rules for how information and communication are exchanged.

protocol

set of common rules that control communications among network devices

protocol

A(n) ________ server acts as a liaison between an internal network and an external network.

proxy

A ________ sends data between two networks.

router

A(n) ________ can often be equipped to act as a hardware firewall.

router

device that sends information between two networks

router

Because of its centralized design, a(n) ________ topology is the simplest to troubleshoot and repair.

star

The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.

terminator

device that absorbs a signal so that it is not reflected back

terminator

Most home networks use ________ cable, which is most susceptible to interference.

unshielded twisted-pair

hosts websites that can be accessed via the Internet

web

A(n) ________ provides wireless devices with a sending and receiving connection point to the network.

wireless access point/WAP


संबंधित स्टडी सेट्स

Gastrointestinal Disorders 2nd set

View Set

Cost: Are these fixed, variable or semi-variable?

View Set

Chapter 4 Computer Information Systems

View Set

Managerial accounting chapter 15

View Set

PrepU: Chapter 17: Newborn Transitioning

View Set

Magoosh GRE words combined USE THIS!

View Set