chapter 12 infotech

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A(n) ________ server is a server that stores and manages files for network users. e-mail database print file

file

A ________ keeps your computer safe by determining who is trying to access it. hub firewall gateway switch

firewall

In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal. stop crash jam hit

jam

The physical address assigned to each network adapter is called its ________ address. physical address control (PAC) network physical address (NPA) media access control (MAC) network access control (NAC)

media access control (MAC)

A ________ is a group of two or more computers, or nodes, configured to share information and resources. router bridge bus network

network

The physical or logical arrangement of computers, transmission media (cables), and other network components is known as network domain. blueprint. protocol. topology.

topology.

Network adapters send data packets based on a(n) MAC address. router address. IP address. frame address.

MAC address.

A network consisting of devices used by a single person connected via wireless media is a LAN. PAN. WAN. MAN.

PAN

Why are client/server networks usually installed in businesses? Security is weaker on client/server networks. They are more scalable than P2P networks. Client/server networks are cheaper to install. They do not require dedicated servers like P2P networks.

They are more scalable than P2P networks.

A ________ uses the Internet communications infrastructure to build a secure and private network. HAN PAN VPN WAN

VPN

Cars often have ________ connectivity. IPv7 and IPv6 Exhaust and fuel injection ROVER-5 and ethernet Wi-Fi and Bluetooth

Wi-Fi and Bluetooth

Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers? PAN intranet VPN WAN

intranet

A MAC address is the address external entities use to communicate with your network. is used for internal identification purposes on a network. is only used on Apple computers. is the same thing as an IP address.

is used for internal identification purposes on a network.

NOS software is needed only on the servers in a client/server network. only when configuring a network in a star topology. on all computers in a client/server network. only if a communications server is deployed on a client/server network.

on all computers in a client/server network.

Providing adequate security on a corporate network involves all of the following issues EXCEPT limiting physical access to networking equipment. restricting access to servers. authentication. proprietary software encryption.

proprietary software encryption.

A network ________ is a set of rules for how information and communications are exchanged. protocol packet frame token

protocol

Which topology tends to provide the fairest allocation of network resources? star bus VPN ring

ring

On client/server networks, bridges are necessary only in networks using the ring topology. transfer data between two networks. route data between two collision domains on a single network. move data efficiently from node to node on the internal network.

route data between two collision domains on a single network.

A ________ sends information between two networks. router switch bridge repeater

router

On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network scalability. topology. decentralization. flexibility.

scalability.

Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network. screening scanning viewing examination

screening

Which of the following is an advantage of installing a client/server network in a business? centralization of network adapters decentralization of files and data sharing of peripherals decentralization of peripherals

sharing of peripherals

Which is NOT a key component of a typical client/server network? transmission media terminator network navigation devices NOS

terminator

Switches are used to send data on a specific route through an internal network. True/False

True

A print server uses a print ________ as a software holding area for jobs waiting to be printed. heap stack spooler logger

spooler

________ is the standard communications protocol used on most client/server networks. VPN Ethernet Mac NOS

Ethernet

A proxy server is used to host websites on a client/server network. True/False

False

MAC adapters perform specific tasks to enable nodes to communicate on a network. True/False

False

Most modern operating systems do not include some type of NOS functionality. True/False

False

Ring topologies are the most widely used topology. True/False

False

________ cable is NOT subject to electromagnetic interference or radio frequency interference. Fiber-optic Coaxial Polycarbonate Twisted-pair

Fiber-optic

A(n) ________ address is the address that external entities use when communicating with your network. WAP IP ALU MAC

IP

The computers in a lab on a floor of a building would be connected using a ________. PAN LAN WAN MAN

LAN

To manage authorized connections to internal networks, which server would a client/server network include? communications application database authentication

authentication

The process whereby users prove they have authorization to use a computer network is known as decentralization. repudiation. authentication. proxy control.

authentication.

Which of the following is used to increase security on a client/server network? transmission media bastion host bridge database server

bastion host

A ________ sends data from one collision domain to another. link router bridge switch

bridge

Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________. brute force attack worm spammer Trojan horse

brute force attack

In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable. bus cluster hierarchical star

bus

A ________ network can contain servers as well as individual computers. peer-to-peer bridge client/server switch

client/server

Which of the following is NOT a common network topology? Cluster Linear bus Ring Star

cluster

Which server would a client/server network include to control data exchanges with other networks? database authentication application communications

communications

Which of the following is NOT an advantage of installing a network in a business? decentralization of files and data enables peripheral sharing centralization of files and data enables software sharing

decentralization of files and data

Fiber-optic cable most likely would be used in a business network when electrical or magnetic interference is present. the installation budget is very limited. saving money is more important than speed. very short cable runs are required.

electrical or magnetic interference is present.

Which network cable type is virtually immune to signal interference? fiber-optic STP coaxial UTP

fiber-optic


संबंधित स्टडी सेट्स

Chapter 9 Key Issue 3 "Where is Agriculture Distributed?"

View Set

Nursing in Today's World Ch. 7 (Stegan & Sowerby 11th ed.)

View Set

Drugs and Human Behavior Final EC

View Set

Hinkle Chapter 13: Fluid and Electrolytes: Balance and Disturbance

View Set

CMS1 Assignment 6: Training and Talent Development

View Set

Instrument Written Missed Questions

View Set

APA 7th Edition for Culture and Ethnic Identity

View Set

Unit 15 Vocabulary Choosing the Right Word

View Set