ISYS: Chapter 12 End of Chapter Quiz

Ace your homework & exams now with Quizwiz!

The process whereby users prove they have authorization to use a computer network is known as

Authentication

Providing adequate security on a corporate network involves all of the following issues EXCEPT

Proprietary Software Encryption

Which topology tends to provide the fairest allocation of network resources?

Ring

On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network

Scalability

Which of the following is an advantage of installing a client/server network in a business?

Sharing of Peripherals

Which is NOT a key component of a typical client/server network?

Terminator

Most modern operating systems include some type of NOS functionality.

True

Network adapters perform specific tasks to enable nodes to communicate on a network.

True

Star topologies are the most widely used topology.

True

Which server would a client/server network include to control data exchanges with other networks?

Communications

A file server is used to host websites on a client/server network.

False

Routers are used to send data on a specific route through an internal network.

False

Which network cable type is virtually immune to signal interference?

Fiber-Optic

Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers?

Intranet

Network adapters send data packets based on a(n)

MAC address


Related study sets

Proportional Reasoning (practice)~ amdm

View Set

Assessment Midterm Chapters 1-7, 12

View Set

Property ownership and land use controls and regulations

View Set