Info Tech Chapter 12

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A ________server is a server that stores and manages files for network users.

file

A ____________topology uses more than one type of topology when building a network

hybrid

The physical address assigned to each network adapter is called its ____________

media access control (MAC).

A ___________is a group of two or more computers, or nodes, configured to share information and resources.

network

In a ___________ network, each node connected to the network communicates directly with every other node.

peer-to-peer

Most wired home networks use _____________ cable, which is more susceptible to interference.

unshielded twisted-pair

The process whereby users prove they have authorization to use a computer network is known as

Authentication

To manage authorized connections to internal networks, which server would a client/server network include?

Authentication

Which of the following is used to increase security on a client/server network?

Bastion Host

Which of the following is NOT a common network topology?

Cluster

Which of the following is NOT an advantage of installing a network in a business?

Decentralization of files and data

Fiber-optic cable most likely would be used in a business network when

Electrical or magnetic interference is present

MAC adaptors perform specific tasks to enable nodes to communicate on a network

False

Most modern operating systems do not include some type of NOS functionality.

False

Ring topologies are the most widely used topology.

False

Which network cable type is virtually immune to signal interference?

Fiber-optic

___________ cable is NOT subject to electromagnetic interference or radio frequency interference.

Fiber-optic

A ____________keeps your computer safe by determining who is trying to access it.

Firewall

Which of the following is a private network set up by a business that's used exclusively by a selected group of employees and suppliers?

Intranet

A MAC address

Is used for internal identification purposes on a network

Network adapters send data packets based on a

MAC address

NOS software is needed

On all computers in a client/server network

A network consisting of devices used by a single person connected via wireless media is a

PAN

Providing adequate security on a corporate network involves all of the following issues EXCEPT

Proprietary software encryption

Which topology tends to provide the fairest allocation of network resources?

Ring

On client/server networks, bridgers

Route data between two collision domains on a single network

On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network

Scalability

Which of the following is an advantage of installing a client/server network in a business?

Sharing of peripherals

Which of the following is the most commonly used client/server network topology?

Star

Which is NOT a key component of a typical client/server network?

Terminator

Why are client/server networks usually installed in businesses?

They are more scalable than P2P networks

A _____________ is a heavily secured server located between a company's secure internal network and its firewall.

bastion host

Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a _______________

brute force attack.

A _____________ network can contain servers as well as individual computers

client/server

Which server would a client/server network include to control data exchanges with other networks?

communications

A proxy server is used to host websites on a client/server network.

false

The physical or logical arrangement of computers, transmission media (cables), and other network components is known as network

Topology

Switches are used to send data on a specific route through an internal network

True

A ______uses the Internet communications infrastructure to build a secure and private network.

VPN

Cars often have ____________ and _________ connectivity.

Wifi and Bluetooth

An _______________server tracks who is logging on to the network as well as which services on the network are available to each user.

authentication

A network ____________is a set of rules for how information and communications are exchanged.

protocol

A _________sends information between two networks.

router

The ends of the cable in a bus network use a ___________to absorb signals so that they are not reflected back to network components that have already received the signals.

terminator

Ring networks use the _________method to avoid data collisions.

token


Set pelajaran terkait

[Introduction To Psychology - PSY111] WileyPlus Ch.12 Animation Quiz: The Polygraph

View Set

I guess it's my turn now (Edited 22:22 Feb 20)

View Set

N137 Labor and Birth Complications

View Set

The Double Burden of Malnutrition

View Set

ATI PHARM Practice Exam FOCUSED 📝

View Set