CHAPTER 12

12 September 2022
4.7 (114 reviews)
95 test answers

Unlock all answers in this set

Unlock answers (91)
question
A ________ is a group of two or more computers, or nodes, designed to share information and resources.
answer
network
question
A ________ network can contain servers as well as individual computers.
answer
client/server
question
In a ________ network, each node connected to the network communicates directly with every other node.
answer
peer-to-peer
question
The computers in a lab on a floor of a building would be connected using a ________.
answer
LAN
question
A ________ uses the Internet communications infrastructure to build a secure and private network.
answer
VPN
question
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.
answer
authentication
question
A(n) ________ server is a server that stores and manages files for network users.
answer
file
question
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
answer
Spooler
question
Which of the following is NOT a common network topology?
answer
Cluster
question
A ________ is a set of rules for how information and communication are exchanged.
answer
protocol
question
Ring networks use the ________ method to avoid data collisions.
answer
token
question
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.
answer
terminator
question
In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.
answer
Bus
question
Which of the following is the most commonly used client/server network topology?
answer
Star
question
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
answer
jam
question
A ________ topology uses more than one topology when building a network.
answer
hybrid
question
________ is the amount of data that can be transmitted across a transmission medium in a certain amount of time.
answer
Bandwidth
question
Which of the following is NOT a factor to consider when selecting network cabling?
answer
Cable diameter
question
________ cable is NOT subject to electromagnetic interference or radio frequency interference.
answer
Fiber-optic
question
For business networks, which of the following is NOT a main cable type?
answer
Duplex
question
Most home networks use ________ cable, which is most susceptible to interference.
answer
unshielded twisted-pair
question
________ is the standard communications protocol used on most client/server networks.
answer
Ethernet
question
The physical address assigned each network adapter is called its ________.
answer
media access control (MAC)
question
A(n) ________ address is the address that external entities use when communicating with your network.
answer
IP
question
A ________ sends data from one collision domain to another.
answer
bridge
question
A ________ sends data between two networks.
answer
router
question
A ________ keeps your computer safe by determining who is trying to access it.
answer
firewall
question
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.
answer
screening
question
A(n) ________ server is a heavily secured server located between a company's secure internal network and its firewall.
answer
bastion host
question
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.
answer
brute force attack
question
A(n) ________ network is often the type of network that is set up in a home or very small business.
answer
peer-to-peer
question
________ means that additional users can easily be added without affecting the performance of the other network nodes.
answer
Scalability
question
A(n) ________ is made up of two or more LANs that are miles apart.
answer
WAN
question
A(n) ________ is used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters.
answer
intranet
question
________ technology places data packets inside other data packets.
answer
Tunneling
question
A(n) ________ is an area of an intranet to which only certain corporations or individuals can access.
answer
extranet
question
A(n) ________ server is maintained by a hosting company and is connected to networks using the Internet.
answer
cloud
question
A(n) ________ server is a server used to fulfill one specific purpose.
answer
dedicated
question
A library book reservation service is a good example of a use for a(n) ________ server.
answer
Database
question
A(n) ________ server is used to host an Internet site.
answer
Web
question
A ring topology is also known as a(n) ________ topology.
answer
loop
question
Because of its centralized design, a(n) ________ topology is the simplest to troubleshoot and repair.
answer
star
question
Fluorescent lights and machinery with motors or transformers are common sources of ________ emissions.
answer
Electromagnetic interference/EMI
question
________ interference is a type of network interference for cable transmission media that can be caused by nearby television or radio signals.
answer
Radio frequency/RF
question
A(n) ________ cable contains a glass or plastic core.
answer
fiber-optic
question
________ cable is the most costly to install.
answer
Fiber-optic
question
A(n) ________ provides wireless devices with a sending and receiving connection point to the network.
answer
wireless access point/WAP
question
NIC stands for ________.
answer
network interface card
question
A(n) ________ is a group of data packets that are sent together.
answer
frame
question
A(n) ________ is a device that reads information from a magnetic strip on the back of a credit card-like identification card.
answer
access card reader/card reader
question
________ is the process that requires users to prove that they have permission to access a computer network.
answer
Authentication
question
A(n) ________ can often be equipped to act as a hardware firewall.
answer
router
question
A(n) ________ server acts as a liaison between an internal network and an external network.
answer
proxy
question
Retinal scanning is an example of ________ authentication.
answer
biometric
question
Identification badges and smart keys are examples of ________ objects that users carry to identify themselves and that allow them access to a computer system or computer facility.
answer
possessed
question
P2P networks become difficult to manage when they exceed five users.
answer
FALSE
question
In a client/server network, each network node communicates directly with every other node on the network.
answer
FALSE
question
An international company like Microsoft would use a MAN to connect all of its computers.
answer
FALSE
question
Data flows in both directions in a ring network.
answer
FALSE
question
In an active topology, each node helps to move data through a network.
answer
TRUE
question
Transmission media comprise the physical system that data take to flow between devices on the network.
answer
TRUE
question
Since data transmissions can pass through fiber-optic cable in only one direction, at least two fibers are required to enable transmission of data in both directions.
answer
TRUE
question
Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.
answer
TRUE
question
Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.
answer
TRUE
question
MAC addresses are restricted to Macintosh computers.
answer
FALSE
question
MAC addresses and IP addresses are the same thing.
answer
FALSE
question
A bridge sends information between two networks.
answer
FALSE
question
A phishing attack is an attempt to access an account by repeatedly trying different passwords.
answer
FALSE
question
Worms often try to disguise from where they are sending data by using a bogus IP addresses instead of using an authorized IP address belonging to the network.
answer
FALSE
question
A facial-recognition scanner is an example of a biometric authentication device.
answer
TRUE
question
keeps track of user logins to the network and which services are available to each user
answer
authentication
question
hosts websites that can be accessed via the Internet
answer
web
question
a server not physically located at a company's site
answer
cloud
question
allows client computers to access a database
answer
database
question
acts as a repository for application software
answer
application
question
set of common rules that control communications among network devices
answer
protocol
question
special type of data packet
answer
token
question
device that absorbs a signal so that it is not reflected back
answer
terminator
question
computer system designed to attract unauthorized users
answer
honey pot
question
holds multiple data packets
answer
frame
question
an operating system for network servers
answer
NOS
question
adapter card that connects a computer to a network
answer
NIC
question
method used on Ethernet networks to avoid data collisions
answer
CSMA/CD
question
network in which each node connected to the network communicates directly with every other node
answer
P2P
question
used for internal identification on a network
answer
MAC address
question
network of two or more LANs
answer
WAN
question
a network in a small geographic area
answer
LAN
question
links users in a specific geographic area (usually a city)
answer
MAN
question
used by a single individual connecting devices using wireless media
answer
PAN
question
can be used for a small home-based business
answer
HAN
question
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
answer
switch
question
software or hardware that prevents unauthorized entry
answer
firewall
question
device that sends information between two networks
answer
router
question
sends data between different collision domains
answer
bridge
question
data broken into a small segment with an address to which it is sent
answer
packet