Chapter 12

Ace your homework & exams now with Quizwiz!

The computers in a lab on a floor of a building would be connected using a ________

LAN

A ________ uses the Internet communications infrastructure to build a secure and private network.

VPN

A ________ sends data from one collision domain to another.

bridge

Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________

brute force attack

In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.

jam

The physical address assigned to each network adapter is called its ________ address

media access control (MAC)

A ________ is a group of two or more computers, or nodes, configured to share information and resources.

network

The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.

terminator

Which of the following is NOT a factor to consider when selecting network cabling?

cable diameter

A bridge sends information between two networks.

false

A phishing attack is an attempt to access an account by repeatedly trying different passwords

false

In a client/server network, each network node communicates directly with every other node on the network.

false

Worms often try to disguise from where they are sending data by using a bogus IP addresses instead of using an authorized IP address belonging to the network

false

A ________ keeps your computer safe by determining who is trying to access it.

firewall

A ________ topology uses more than one topology when building a network.

hybrid

For business networks, which of the following is NOT one of the main cable types?

polyvinyl

A network ________ is a set of rules for how information and communications are exchanged

protocol

Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it

true

In an active topology, each node helps to move data through a network.

true

P2P networks are very difficult to administer when they have large numbers of users.

true


Related study sets

MRU8.6: Price Ceilings: Rent Controls

View Set

CMS 2 Assignment 9: Aligning Strategy, Talent and Rewards: Pay-for-Performance Plans

View Set

Chapter 9: Teaching and Counseling

View Set

Emile Durkheim and Structural Functionalism

View Set

Chapter 8-Segment and Interim Reporting

View Set

Experience Marketing FINAL EXAM test 1

View Set