Lesson 25

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Simon tells the board that he uses a ____ as an intermediary between a user and the Internet, ensuring security, administrative control, and caching service.

proxy server

Most WANs consists of 2 or more LANs and are connected by ____.

routers

An ____ is hardware ( a computer) that can be used to share mail, databases, and more.

server

____ operating systems provide network control and include special functions for connecting computers and other devices.

server

Ali learns that ____ is highspeed Internet access.

Broadband

____ consist of special hardware and software that protects an internal network from external networks.

Firewalls

Which of the following is not a classification type of network?

LAN

Simon tells the board that his department does all of the following, Except ____.

Occasionally run antivirus software in order to protect data and programs.

The figure above shows examples of a(n) ____ network.

Peer-to-peer

Which of the following is not true about connecting to the internet?

A DSL can carry data, but not voice

Which of the following is not true about network risks?

A standalone system is vulnerable to the same risks as networked computers.

Which of the following is not a type of server operating system?

Adobe Dreamweaver

Which of the following types of networks use IP technology?

All the above

Which of the following is true about the benefits of networking?

All the above are true

An ____ is a software program such as Internet Explorer.

Client

Which of the following is not true about the networks shown in the figure above?

Designed for the exclusive use of people within an organization.

Which of the following is not an example of malicious code?

Hackers

Ali learns that all of the following are true except ____.

Sniffer software devices are usually external devices, not built in.

PSTN stand for Public Switched ____ Network.

Telephone

Which of the following is not true about network security?

The most common form of restricting access to data is biometrics.


Set pelajaran terkait

Patho elsevier quiz respiratory/musculoskeletal

View Set

Assessment of the Renal/Urinary System

View Set

Review question for chapter 54,55,56 Psyc

View Set

2. The Bible as a source of wisdom and authority

View Set

Chapter 11 Implementing Policies to Mitigate Risks

View Set