CIT 15 Chapter 12 Technology in Action 16e Fresno City College Fall 2019

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

a(n) ___ is a heavily secured server located between a company's secure internal network and its firewall

bastion host

a facial recognition scanner is an example of

biometric authentication device

a ___ sends data from one collision domain to another

bridge

peer-to-peer networks are considered

centralized Networks

UTP cable has

foil shielding

a communication server manages

internet connectivity

which f the following is the most commonly used client/server network topology

star

a bridge sends information between

two Networks

a ___ topology uses more than one type of topology when building a network

Hybrid

a(n) ___ address is the address that external entities use when communicating with your network.

IP

the computer in a lab on a floor of a building would be connected using a ___

LAN

an international company like Microsoft would use a

MAN to connect all of its computers

Mac addresses are restricted to

Macintosh computers

a __ is a group of two or more computers or nodes configured to share information and resources

Network

the end of a cable in a bus Network uses a ___ to absorb signal so that they are not reflected back to the network component that have already received the signal

Terminator

most wired home networks use _____ cable, which is most susceptible to interference

Unshielded twisted pair

a ___ uses the internet communication infrastructure to build a secure and private Network

VPN

cars often have ___ connectivity

Wi-Fi and Bluetooth

in a star topography the notes connect to a central Communication device called

a router

P2P networks become difficult to

administer when they have large numbers of users

multi-factor authorization required three to four possible factors to demonstrate before

authorization is granted

worms often try to disguise their Origins by using a bogus IP address instead of using an

authorized IP address belonging to the network

___ is the amount of data that can be transmitted across a transmission medium measured in bits per second

bandwidth

Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.

brute-force attack

in a ___ Network data collisions can occur fairly easily because the network is essentially composed of a single cable

bus

in which topology are all computers connected in sequence on a single cable

bus

which of the following is not a major factor to consider when selecting network cabling

cable diameter

a ___ Network can contain servers as well as individual computers

client / server

which of the following is not a common Network topology

cluster

Wireless access points can provide coverage wherever employees are working with portable devices such as in

conference rooms

the foil sheets on an STP cable is there to help

cut down on interference

a phishing attack is an attempt to access an account by repeatedly trying

different passwords

since data transmission can pass through fiber optic cable in Only One Direction at least two fibers are required to

enable transmission of data in both directions

___ is the standard communications protocol used on most client / server networks

ethernet

in a client / server Network each network node communicates directly with

every other node on the network

___ cable is not subject to electromagnetic interference or radio frequency interference

fiber-optic

a ___ server is a server that stores and manages files for Network users

file

transmission media comprise the path that data takes to

flow between devices on the network

one function of communication servers are to process and deliver

incoming and outgoing email

availability, integrity, authentication, confidentiality, and non-repudiation are the five key attributes of

information assurance

in an ethernet network, the signal that is sent to indicate a signal collision is called a ___ signal

jam

the physical address assigned to each network adapter is called its ___ address

media access control (MAC)

in an active topology each node helps to

move data through a network

The Institute of electrical and electronic engineering has establish worldwide networking protocols including the

open system interconnection reference model

bus networks use a

passive topology

a ___ sends information between two networks

router

Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.

screening

crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with

signals on the wire next to it

when several people need access to a database, a dedicated database server can be the

solution

a printer server uses a print ___ as a software holding area for jobs waiting to be printed

spooler

Mac addresses and IP addresses are

the same thing

a ___ server tracks who is logging on to the network as well as which service on the network are available to each user

Authentication

which of the following would not be considered a possessed object

Driver's license

in a ___ Network each node connected to the network communicates directly with every other node

peer-to-peer

For business networks, which of the following is NOT one of the main cable types

polyvinyl

a network ___ is a set of rules for how information and Communications are exchanged

protocol

an application server acts as a

repository for application software

data flows in both directions around the ring n a

ring Network

ring networks use the ___ method to avoid data Collision

token

which of the following involves using specialized software to make individual physical servers behave as though they are more than one physical device

virtualization


Set pelajaran terkait

Fluid regulation, water, electrolytes

View Set

Comptia N10-007 Practice test Questions Part 2

View Set

Med Surg Success Musculoskeletal Practice Test

View Set