chapter 12
A(n) ________ server is a server that stores and manages files for network users -database -print -file -e-mail
file
A ________ keeps your computer safe by determining who is trying to access it. -hub -firewall -switch -gateway
firewall
Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers? -PAN -WAN -intranet -VPN
intranet
A MAC address -is only used on Apple computers. -is the same thing as an IP address. -is the address external entities use to communicate with your network. -is used for internal identification purposes on a network.
is used for the internal identification purposes on a network
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal. -hit -crash -jam -stop
jam
The physical address assigned to each network adapter is called its ________ address. -physical address control (PAC) -media access control (MAC) -network physical address (NPA) -network access control (NAC)
media access control(MAC)
A ________ is a group of two or more computers, or nodes, configured to share information and resources. -bus -bridge -router -network
network
NOS software is needed -only if a communications server is deployed on a client/server network. -only when configuring a network in a star topology. -on all computers in a client/server network. -only on the servers in a client/server network.
on all computers in a client/server network
A network consisting of devices used by a single person connected via wireless media is a -MAN. -LAN. -PAN. -WAN.
pan
In a ________ network, each node connected to the network communicates directly with every other node. -router -client/server -bridge -peer-to-peer
peer-to-peer
Providing adequate security on a corporate network involves all of the following issues EXCEPT -restricting access to servers. -authentication. -proprietary software encryption. -limiting physical access to networking equipment.
proprietary software encryption
The physical or logical arrangement of computers, transmission media (cables), and other network components is known as network -blueprint. -topology. -domain. -protocol.
topology
Switches are used to send data on a specific route through an internal network
true
Most wired home networks use ________ cable, which is most susceptible to interference -coaxial -Wi-Fi -unshielded twisted-pair -fiber-optic
unshielded twisted-pair
Network adapters send data packets based on a(n) -router address. -frame address. -IP address. -MAC address.
MAC address
Why are client/server networks usually installed in businesses? -Security is weaker on client/server networks. -Client/server networks are cheaper to install. -They do not require dedicated servers like P2P networks. -They are more scalable than P2P networks.
They are more scalable than P2P networks
________ is the amount of data that can be transmitted across a transmission medium measured in bits per second. -Bandwidth -Data capacity -Infusion -Scalability
bandwidth
Which of the following is used to increase security on a client/server network? -bastion host -bridge -transmission media -database server
bastion host
A ________ sends data from one collision domain to another. -switch -router -bridge -link
bridge
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________. -brute force attack -Trojan horse -worm -spammer
brute force attack
Which of the following is NOT a common network topology? -Ring -Linear bus -Star -Cluster
cluster
Which server would a client/server network include to control data exchanges with other networks? -authentication -communications -application -database
communications
Which of the following is NOT an advantage of installing a network in a business? -enables peripheral sharing -decentralization of files and data -centralization of files and data -enables software sharing
decentralization of files and data
Fiber-optic cable most likely would be used in a business network when -saving money is more important than speed. -electrical or magnetic interference is present. -the installation budget is very limited. -very short cable runs are required.
electrical or magnetic interference is present
________ is the standard communications protocol used on most client/server networks. -NOS -Mac -VPN -Ethernet
ethernet
A proxy server is used to host websites on a client/server network.
false
MAC adapters perform specific tasks to enable nodes to communicate on a network.
false
Most modern operating systems do not include some type of NOS functionality.
false
Ring topologies are the most widely used topology.
false
Which network cable type is virtually immune to signal interference? -UTP -coaxial -fiber-optic -STP
fiber optic
________ cable is NOT subject to electromagnetic interference or radio frequency interference. -Coaxial -Twisted-pair -Fiber-optic -Polycarbonate
fiber-optic
A ________ uses the Internet communications infrastructure to build a secure and private network. -HAN -PAN -WAN -VPN
VPN
The process whereby users prove they have authorization to use a computer network is known as -decentralization. -repudiation. -proxy control. -authentication.
authentication
To manage authorized connections to internal networks, which server would a client/server network include? -database -communications -application -authentication
authentication
A network ________ is a set of rules for how information and communications are exchanged. -frame -packet -protocol -token
protocol
Which topology tends to provide the fairest allocation of network resources? -VPN -bus -star -ring
ring
On client/server networks, bridges -move data efficiently from node to node on the internal network. -transfer data between two networks. -are necessary only in networks using the ring topology. -route data between two collision domains on a single network.
route data between two collision domains on a single network
A ________ sends information between two networks. -bridge -switch -router -repeater
router
On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network -decentralization. -topology. -scalability. -flexibility.
scalaility
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network -examination -scanning -viewing -screening
screening
Which of the following is an advantage of installing a client/server network in a business? -sharing of peripherals -decentralization of peripherals -centralization of network adapters -decentralization of files and data
sharing of peripherals
A print server uses a print ________ as a software holding area for jobs waiting to be printed -stack -heap -logger -spooler
spooler
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals. -endcap -terminator -block -stopper
terminator
Which is NOT a key component of a typical client/server network? -terminator -network navigation devices -NOS -transmission media
terminator
Ring networks use the ________ method to avoid data collisions. -token -passive-check -active-check -packet screening
token