Info Tech Chapter 12
A ________server is a server that stores and manages files for network users.
file
A ____________topology uses more than one type of topology when building a network
hybrid
The physical address assigned to each network adapter is called its ____________
media access control (MAC).
A ___________is a group of two or more computers, or nodes, configured to share information and resources.
network
In a ___________ network, each node connected to the network communicates directly with every other node.
peer-to-peer
Most wired home networks use _____________ cable, which is more susceptible to interference.
unshielded twisted-pair
The process whereby users prove they have authorization to use a computer network is known as
Authentication
To manage authorized connections to internal networks, which server would a client/server network include?
Authentication
Which of the following is used to increase security on a client/server network?
Bastion Host
Which of the following is NOT a common network topology?
Cluster
Which of the following is NOT an advantage of installing a network in a business?
Decentralization of files and data
Fiber-optic cable most likely would be used in a business network when
Electrical or magnetic interference is present
MAC adaptors perform specific tasks to enable nodes to communicate on a network
False
Most modern operating systems do not include some type of NOS functionality.
False
Ring topologies are the most widely used topology.
False
Which network cable type is virtually immune to signal interference?
Fiber-optic
___________ cable is NOT subject to electromagnetic interference or radio frequency interference.
Fiber-optic
A ____________keeps your computer safe by determining who is trying to access it.
Firewall
Which of the following is a private network set up by a business that's used exclusively by a selected group of employees and suppliers?
Intranet
A MAC address
Is used for internal identification purposes on a network
Network adapters send data packets based on a
MAC address
NOS software is needed
On all computers in a client/server network
A network consisting of devices used by a single person connected via wireless media is a
PAN
Providing adequate security on a corporate network involves all of the following issues EXCEPT
Proprietary software encryption
Which topology tends to provide the fairest allocation of network resources?
Ring
On client/server networks, bridgers
Route data between two collision domains on a single network
On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network
Scalability
Which of the following is an advantage of installing a client/server network in a business?
Sharing of peripherals
Which of the following is the most commonly used client/server network topology?
Star
Which is NOT a key component of a typical client/server network?
Terminator
Why are client/server networks usually installed in businesses?
They are more scalable than P2P networks
A _____________ is a heavily secured server located between a company's secure internal network and its firewall.
bastion host
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a _______________
brute force attack.
A _____________ network can contain servers as well as individual computers
client/server
Which server would a client/server network include to control data exchanges with other networks?
communications
A proxy server is used to host websites on a client/server network.
false
The physical or logical arrangement of computers, transmission media (cables), and other network components is known as network
Topology
Switches are used to send data on a specific route through an internal network
True
A ______uses the Internet communications infrastructure to build a secure and private network.
VPN
Cars often have ____________ and _________ connectivity.
Wifi and Bluetooth
An _______________server tracks who is logging on to the network as well as which services on the network are available to each user.
authentication
A network ____________is a set of rules for how information and communications are exchanged.
protocol
A _________sends information between two networks.
router
The ends of the cable in a bus network use a ___________to absorb signals so that they are not reflected back to network components that have already received the signals.
terminator
Ring networks use the _________method to avoid data collisions.
token