CIT 15 Chapter 12

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

MAC addresses are restricted to Macintosh computers.

false

Since data transmissions can pass through fiber-optic cable in only one direction, at least two fibers are required to enable transmission of data in both directions.

true

The Institute of Electrical and Electronics Engineers (IEEE) has established worldwide networking protocols, including the Open Systems Interconnection (OSI) reference model.

true

The foil sheath on a STP cable is there to help cut down on interference.

true

Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________. A) brute force attack B) spammer C) worm D) Trojan horse

A) brute force attack

A(n) ________ server is a server that stores and manages files for network users. A) file B) e-mail C) print D) database

A) file

A ________ uses the Internet communications infrastructure to build a secure and private network. A) PAN B) WAN C) VPN D) HAN

C) VPN

A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall. A) transitional B) iron-clad C) bastion host D) proxy

C) bastion host

In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal. A) hit B) crash C) stop D) jam

D) jam

in which topology are all computers connected in sequence on a single cable?

bus

A bridge sends information between two networks.

false

A phishing attack is an attempt to access an account by repeatedly trying different passwords.

false

In a star topology, the nodes connect to a central communications device called a router.

false

Multi-factor authentication requires three of four possible factors be demonstrated before authorization is granted.

false

One function of a communication server is to process and deliver incoming and outgoing e-mail.

false

Peer-to-peer networks are considered centralized networks.

false

UTP cable has foil shielding.

false

Worms often try to disguise their origins by using a bogus IP address instead of using an authorized IP address belonging to the network.

false

Availability, Integrity, Authentication, Confidentiality, and Nonrepudiation are the five key attributes of ________.

information assurance

Which of the following is NOT a common network topology? A) Star B) Cluster C) Linear bus D) Ring

B) Cluster

________ cable is NOT subject to electromagnetic interference or radio frequency interference. A) Twisted-pair B) Fiber-optic C) Polycarbonate D) Coaxial

B) Fiber-optic

The computers in a lab on a floor of a building would be connected using a ________. A) WAN B) LAN C) MAN D) PAN

B) LAN

For business networks, which of the following is NOT one of the main cable types? A) Twisted-pair B) Polyvinyl C) Coaxial D) Fiber-optic

B) Polyvinyl

A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user. A) application B) authentication C) dedicated D) file

B) authentication

A ________ sends data from one collision domain to another. A) switch B) bridge C) link D) router

B) bridge

In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable. A) star B) bus C) hierarchical D) cluster

B) bus

In a ________ network, each node connected to the network communicates directly with every other node. A) client/server B) peer-to-peer C) router D) bridge

B) peer-to-peer

A print server uses a print ________ as a software holding area for jobs waiting to be printed. A) stack B) spooler C) logger D) heap

B) spooler

The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals. A) endcap B) terminator C) stopper D) block

B) terminator

Most wired home networks use ________ cable, which is most susceptible to interference. A) fiber-optic B) unshielded twisted-pair C) Wi-Fi D) coaxial

B) unshielded twisted-pair

Ring networks use the ________ method to avoid data collisions. A) packet screening B) active-check C) token D) passive-check

C) token

A(n) ________ address is the address that external entities use when communicating with your network. A) ALU B) MAC C) WAP D) IP

D) IP

The physical address assigned to each network adapter is called its ________ address. A) network access control (NAC) B) physical address control (PAC) C) network physical address (NPA) D) media access control (MAC)

D) media access control (MAC)

A ________ is a group of two or more computers, or nodes, configured to share information and resources. A) router B) bus C) bridge D) network

D) network

A ________ sends information between two networks. A) repeater B) switch C) bridge D) router

D) router

Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network. A) viewing B) examination C) scanning D) screening

D) screening

An international company like Microsoft would use a MAN to connect all of its computers.

false

Data flows in both directions around the ring in a ring network.

false

In a client/server network, each network node communicates directly with every other node on the network.

false

MAC addresses and IP addresses are the same thing.

false

Which of the following would not be considered a possessed object?

pasword

In an active topology, each node helps to move data through a network.

true

P2P networks become difficult to administer when they have large numbers of users.

true

Transmission media comprise the path that data takes to flow between devices on the network.

true

When several people need access to a database, a dedicated database server can be the solution.

true

Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.

true

Which of the following involves using specialized software to make individual physical servers behave as though they are more than one physical device?

virtualization

Which of the following is NOT a factor to consider when selecting network cabling? A) Cable diameter B) Interference C) Maximum run length D) Bandwidth

A) Cable diameter

________ is the standard communications protocol used on most client/server networks. A) Ethernet B) NOS C) Mac D) VPN

A) Ethernet

Which of the following is the most commonly used client/server network topology? A) Star B) Cluster C) Ring D) Hierarchical

A) Star

Cars often have ________ networks. A) Wi-Fi and Bluetooth B) ROVER-5 and ethernet C) IPv7 and IPv6 D) Exhaust and fuel injection

A) Wi-Fi and Bluetooth

A ________ network can contain servers as well as individual computers. A) client/server B) peer-to-peer C) switch D) star

A) client/server

________ is the amount of data that can be transmitted across a transmission medium measured in bits per second. A) Data capacity B) Scalability C) Bandwidth D) Infusion

C) Bandwidth

A communications server manages Internet connectivity.

true

A facial-recognition scanner is an example of a biometric authentication device.

true

An application server acts as a repository for application software.

true

Bus networks use a passive topology.

true

Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.

true

A ________ topology uses more than one topology when building a network. A) hybrid B) multiple-use C) fusion D) crossover

A) hybrid

A network ________ is a set of rules for how information and communications are exchanged. A) protocol B) token C) frame D) packet

A) protocol


Set pelajaran terkait

Principles of Exercise: Lesson 6

View Set

chap 11 launchpad, chap 11 quiz, chap 12 quiz, chap 12 launchpad, chap 15 launchpad, chap 16 launchpad, chap 17 launchpad, chap 19 launchpad, chap 42 launchpad, chap 16, 15, 17 quiz, chap 19 quiz, chap 30 quiz, chap 30 self assessment, exam 4, exam 4...

View Set

Peds final (ch 1, 3-7, 13-15, 18-21, 23): part 2 (fixed)

View Set

Ch. 28: Pregnancy and Human Development

View Set

Unit 2 Smartbook Assignments and Activities

View Set

Chapter 7: Protective Gear and Sports Equipment

View Set

Completing the Application, Underwriting, and delivering the policy QUIZ

View Set

Last names (Apellidos) customs in the Hispanic world

View Set