CIT 15 Chapter 12 Technology in Action 16e Fresno City College Fall 2019
a(n) ___ is a heavily secured server located between a company's secure internal network and its firewall
bastion host
a facial recognition scanner is an example of
biometric authentication device
a ___ sends data from one collision domain to another
bridge
peer-to-peer networks are considered
centralized Networks
UTP cable has
foil shielding
a communication server manages
internet connectivity
which f the following is the most commonly used client/server network topology
star
a bridge sends information between
two Networks
a ___ topology uses more than one type of topology when building a network
Hybrid
a(n) ___ address is the address that external entities use when communicating with your network.
IP
the computer in a lab on a floor of a building would be connected using a ___
LAN
an international company like Microsoft would use a
MAN to connect all of its computers
Mac addresses are restricted to
Macintosh computers
a __ is a group of two or more computers or nodes configured to share information and resources
Network
the end of a cable in a bus Network uses a ___ to absorb signal so that they are not reflected back to the network component that have already received the signal
Terminator
most wired home networks use _____ cable, which is most susceptible to interference
Unshielded twisted pair
a ___ uses the internet communication infrastructure to build a secure and private Network
VPN
cars often have ___ connectivity
Wi-Fi and Bluetooth
in a star topography the notes connect to a central Communication device called
a router
P2P networks become difficult to
administer when they have large numbers of users
multi-factor authorization required three to four possible factors to demonstrate before
authorization is granted
worms often try to disguise their Origins by using a bogus IP address instead of using an
authorized IP address belonging to the network
___ is the amount of data that can be transmitted across a transmission medium measured in bits per second
bandwidth
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.
brute-force attack
in a ___ Network data collisions can occur fairly easily because the network is essentially composed of a single cable
bus
in which topology are all computers connected in sequence on a single cable
bus
which of the following is not a major factor to consider when selecting network cabling
cable diameter
a ___ Network can contain servers as well as individual computers
client / server
which of the following is not a common Network topology
cluster
Wireless access points can provide coverage wherever employees are working with portable devices such as in
conference rooms
the foil sheets on an STP cable is there to help
cut down on interference
a phishing attack is an attempt to access an account by repeatedly trying
different passwords
since data transmission can pass through fiber optic cable in Only One Direction at least two fibers are required to
enable transmission of data in both directions
___ is the standard communications protocol used on most client / server networks
ethernet
in a client / server Network each network node communicates directly with
every other node on the network
___ cable is not subject to electromagnetic interference or radio frequency interference
fiber-optic
a ___ server is a server that stores and manages files for Network users
file
transmission media comprise the path that data takes to
flow between devices on the network
one function of communication servers are to process and deliver
incoming and outgoing email
availability, integrity, authentication, confidentiality, and non-repudiation are the five key attributes of
information assurance
in an ethernet network, the signal that is sent to indicate a signal collision is called a ___ signal
jam
the physical address assigned to each network adapter is called its ___ address
media access control (MAC)
in an active topology each node helps to
move data through a network
The Institute of electrical and electronic engineering has establish worldwide networking protocols including the
open system interconnection reference model
bus networks use a
passive topology
a ___ sends information between two networks
router
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.
screening
crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with
signals on the wire next to it
when several people need access to a database, a dedicated database server can be the
solution
a printer server uses a print ___ as a software holding area for jobs waiting to be printed
spooler
Mac addresses and IP addresses are
the same thing
a ___ server tracks who is logging on to the network as well as which service on the network are available to each user
Authentication
which of the following would not be considered a possessed object
Driver's license
in a ___ Network each node connected to the network communicates directly with every other node
peer-to-peer
For business networks, which of the following is NOT one of the main cable types
polyvinyl
a network ___ is a set of rules for how information and Communications are exchanged
protocol
an application server acts as a
repository for application software
data flows in both directions around the ring n a
ring Network
ring networks use the ___ method to avoid data Collision
token
which of the following involves using specialized software to make individual physical servers behave as though they are more than one physical device
virtualization