MGMT Chapter 12

Ace your homework & exams now with Quizwiz!

________ is the amount of data that can be transmitted across a transmission medium measured in bits per second.

Bandwidth

Which of the following is used to increase security on a client/server network?

Bastion host

Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.

Brute force attack

In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.

Bus

Which of the following is NOT a common network topology?

Cluster

Which server would a client/server network include to control data exchanges with other networks?

Communications

Which of the following is NOT an advantage of installing a network in a business?

Decentralization of files and data

Fiber-optic cable most likely would be used in a business network when?

Electrical or magnetic interference is present

A proxy server is used to host websites on a client/server network.

FALSE

MAC adapters perform specific tasks to enable nodes to communicate on a network.

FALSE

Most modern operating systems do not include some type of NOS functionality.

FALSE

Ring topologies are the most widely used topology.

FALSE

________ cable is NOT subject to electromagnetic interference or radio frequency interference.

Fiber-Optic

Which network cable type is virtually immune to signal interference?

Fiber-optic

A(n) ________ server is a server that stores and manages files for network users.

File

A ________ topology uses more than one type of topology when building a network.

Hybrid

Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers?

Intranet

A MAC address...

Is used for internal identification purposes on a network

Network adapters send data packets based on a(n)

MAC address

A ________ is a group of two or more computers, or nodes, configured to share information and resources.

Network

NOS software is needed

On all computers in a client/server network

A network consisting of devices used by a single person connected via wireless media is a

PAN

For business networks, which of the following is NOT one of the main cable types?

Polyvinyl

Providing adequate security on a corporate network involves all of the following issues EXCEPT

Proprietary software encryption

A network ________ is a set of rules for how information and communications are exchanged.

Protocol

Which topology tends to provide the fairest allocation of network resources?

Ring

On Client/Server networks, bridges...

Route data between two collision domains on a single network

A ________ sends information between two networks.

Router

On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network

Scalability

Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.

Screening

Which of the following is the most commonly used client/server network topology?

Star

Switches are used to send data on a specific route through an internal network.

TRUE

The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.

Terminator

Which is NOT a key component of a typical client/server network?

Terminator

Why are client/server networks usually installed in businesses?

They are more scalable than P2P networks

The process whereby users prove they have authorization to use a computer network is known as

Authentication

To manage authorized connections to internal networks, which server would a client/server network include?

Authentication

A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.

Authentication

Which of the following is NOT a major factor to consider when selecting network cabling?

Cable diameter

A ________ network can contain servers as well as individual computers.

Client/Server

Which of the following is an advantage of installing a client/server network in a business?

Decentralization of files and data

A(n) ________ address is the address that external entities use when communicating with your network.

IP

The physical address assigned to each network adapter is called its ________ address.

Media access control (MAC)

The physical or logical arrangement of computers, transmission media (cables), and other network components is known as network

Topology

A ________ uses the Internet communications infrastructure to build a secure and private network.

VPN


Related study sets

Public Health 10: Stress Management Lesson 10, Public Health 10: Stress Management Lesson 11, Public Health 10: Stress Management Lesson 12, Public Health 10: Stress Management Lesson 14, Public Health 10: Stress Management Lesson 13, UCI Public Heal...

View Set

MORALITY: A Man For All Seasons Quotes

View Set

Chapter 4 exam - Life Premiums and Benfits

View Set

A&P 2 Chapter 21 Blood Vessels and Circulation

View Set

Intro to Sociology- Chapter 5 Questions

View Set

musculoskeletal ULTIMATE NCLEX queries

View Set

Chapter 11: Gender, Sex, and Sexuality

View Set