Tech in Action Chapter 12

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

method used on Ethernet networks to avoid data collisions

CSMA/CD

Peer-to-peer networks are considered centralized networks.

False

Routers are used to send data on a specific route through an internal network.

False switches

A network consisting of nodes covering a small geographic area is a

LAN

The computers in a lab on a floor of a building would be connected using a ________.

LAN

)Which topology tends to provide the fairest allocation of network resources?

Ring

Which of the following is an advantage of installing a client/server network in a business?

Sharing of peripherals

P2P networks become difficult to administer when they have large numbers of users.

True

Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.

True

Which network cable type is most susceptible to signal interference?

UTP

A(n) ________ server is a repository for shared computer programs accessed by client computers.

application

The process whereby users prove they have authorization to use a computer network is known as

authentication.

Which is not a key component of a typical client/server network?

bastion host or transmission method

In which topology are all computers connected in sequence on a single cable?

bus

A ________ network can contain servers as well as individual computers.

client/server

Which of the following is not a common network topology?

cluster

Fiber-optic cable most likely would be used in a business network when

electrical or magnetic interference is present.

A bridge sends information between two networks.

false

A proxy server is used to host websites on a client/server network.

false

An authentication server is used to host websites on a client/server network.

false

Data flows in both directions around the ring in a ring network.

false

MAC adapters perform specific tasks to enable nodes to communicate on a network.

false

Multi-factor authentication requires three of four possible factors be demonstrated before authorizationis granted.

false

UTP cable has foil shielding.

false

In a client/server network, each network node communicates directly with every other node on the network.

false (P2P does)

________ cable is not subject to electromagnetic interference or radio frequency interference.

fiber optic

A(n) ________ server is a server that stores and manages files for network users.

file

Sometimes groups of data packets are sent together in a package called a

frame.

A ________ topology uses more than one type of topology when building a network.

hybrid

Which of the following is not one of the factors used in multi-factor authentication?

identity

Providing adequate security on a corporate network involves all of the following issues EXCEPT

proprietary software encryption

On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network

scalability.

Which of the following is the most commonly used client/server network topology?

star

Which of the following is not used to increase security on a client/server network?

switch

The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.

terminator

Ring networks use the ________ method to avoid data collisions.

token

On client/server networks, routers

transfer data between two networks.

Most modern operating systems include some type of NOS functionality.

true

Since data transmissions can pass through fiber-optic cable in only one direction, at least two fibers are required to enable transmission of data in both directions.

true

Star topologies are the most widely used topology.

true

Switches are used to send data on a specific route through an internal network.

true

The foil sheath on a STP cable is there to help cut down on interference.

true

When several people need access to a database, a dedicated database server can be the solution.

true

An international company like Microsoft would use a MAN to connect all of its computers.

False

In a star topology, the nodes connect to a central communications device called a router.

False

Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers?

Intranet

Network adapters send data packets based on a(n)

MAC address

used for internal identification of nodes on a network

MAC address

network in which each node connected to the network communicates directly with every other node

P2P

A communications server manages Internet connectivity.

True

A facial-recognition scanner is an example of a biometric authentication device.

True

A ________ uses the Internet communications infrastructure to build a secure and private network.

VPN

Network adapters use _______ addresses to route date on an internal network.

MAC

an operating system for network servers

NOS - network operating system

One function of a communication server is to process and deliver incoming and outgoing e-mail.

false (email server does)

Which network cable type is virtually immune to signal interference?

fiber-optic

In an active topology, each node helps to move data through a network.

true

Network adapters perform specific tasks to enable nodes to communicate on a network.

true

Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.

brute-force attack

In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.

bus

In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.

jam

The physical address assigned to each network adapter is called its ________ address.

media access control: MAC address

NOS software is needed

on all computers in a client/server network.

A ________ is a set of rules for exchanging communications.

protocol

A network ________ is a set of rules for how information and communications are exchanged.

protocol

An application server acts as a repository for application software.

true

Most wired home networks use ________ cable, which is most susceptible to interference.

unshielded twisted-pair

adapter card that connects a computer to a network

NIC

Which server would a client/server network include to ensure only authorized users are logging onto the network?

Authentication

Which of the following is not an advantage of installing a network in a business?

Decentralization of files and data

Which of the following involves using specialized software to make individual physical servers behave as though they are more than one physical device?

virtualization

Advantages of a network

Centralization of files and data Enables peripheral sharing Enables software sharing

Why are client/server networks usually installed in the home?

Client/server networks are too complex for most home networks.


Set pelajaran terkait

Корень "ясный" с приставками

View Set

CS271 - Module 1 Notes & Knowledge Checks

View Set

Special Positioning- Upper Extremities

View Set