ISYS: Chapter 12 End of Chapter Quiz
The process whereby users prove they have authorization to use a computer network is known as
Authentication
Providing adequate security on a corporate network involves all of the following issues EXCEPT
Proprietary Software Encryption
Which topology tends to provide the fairest allocation of network resources?
Ring
On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network
Scalability
Which of the following is an advantage of installing a client/server network in a business?
Sharing of Peripherals
Which is NOT a key component of a typical client/server network?
Terminator
Most modern operating systems include some type of NOS functionality.
True
Network adapters perform specific tasks to enable nodes to communicate on a network.
True
Star topologies are the most widely used topology.
True
Which server would a client/server network include to control data exchanges with other networks?
Communications
A file server is used to host websites on a client/server network.
False
Routers are used to send data on a specific route through an internal network.
False
Which network cable type is virtually immune to signal interference?
Fiber-Optic
Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers?
Intranet
Network adapters send data packets based on a(n)
MAC address