Chapter 12

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A phishing attack is an attempt to access an account by repeatedly trying different passwords.

False

An international company like Microsoft would use a MAN to connect all of its computers.

False

Worms often try to disguise from where they are sending data by using a bogus IP addresses instead of using an authorized IP address belonging to the network.

False

n an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.

Jam

The computers in a lab on a floor of a building would be connected using a _

LAN

A network ________ is a set of rules for how information and communications are exchanged.

Protocol

A ________ sends information between two networks.

Router

Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.

Screening

Transmission media comprise the system that data takes to flow between devices on the network.

True

ireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms

True

Cars often have ________ networks.

Wi-Fi and Bluetooth

A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall.

bastion host

Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________

brute force attack

A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.

Authentication

The physical address assigned to each network adapter is called its ________ address.

media access control (MAC)

A ________ is a group of two or more computers, or nodes, configured to share information and resources.

network

A print server uses a print ________ as a software holding area for jobs waiting to be printed.

spooler

The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.

terminator

A ________ network can contain servers as well as individual computers.

client/server

Which of the following is NOT a common network topology?

cluster


Set pelajaran terkait

AP Chemistry~First Semester Final Examination & Entailment (Nolan)~(2020-2021)

View Set

Prep U 47 Management of Patients With Gastric and Duodenal Disorders

View Set

8. Third month to Birth: The fetus and placenta

View Set

Chapter 45 - Hormones and the Endocrine System

View Set

Chapter 12: Oncologic Management

View Set