Chapter 12 - Behind the Scenes: Networking and Security in the Business World Flashcards

1
Q
A \_\_\_\_\_\_\_\_ network can contain servers as well as individual computers.
A) client/server
B) peer-to-peer
C) switch
D) star
A

A) client/server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
In a \_\_\_\_\_\_\_\_ network, each node connected to the network communicates directly with every other node.
A) client/server
B) peer-to-peer
C) router
D) bridge
A

B) peer-to-peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A \_\_\_\_\_\_\_\_ uses the Internet communications infrastructure to build a secure and private network.
A) PAN
B) WAN
C) VPN
D) HAN
A

C) VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A(n) \_\_\_\_\_\_\_\_ server tracks who is logging on to the network as well as which services on the network are available to each user.
A) application
B) authentication 
C) dedicated
D) file
A

B) authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A print server uses a print \_\_\_\_\_\_\_\_ as a software holding area for jobs waiting to be printed.
A) stack
B) spooler
C) logger
D) heap
A

B) spooler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following is NOT a common network topology?
A) Star
B) Cluster
C) Linear bus
D) Ring
A

B) Cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Ring networks use the \_\_\_\_\_\_\_\_ method to avoid data collisions.
A) packet screening
B) active-check
C) token
D) passive-check
A

C) token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
The ends of the cable in a bus network use a(n) \_\_\_\_\_\_\_\_ to absorb signals so that they are not reflected back to network components that have already received the signals.
A) endcap 
B) terminator
C) stopper
D) block
A

B) terminator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
In a \_\_\_\_\_\_\_\_ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.
A) Star 
B) Bus
C) Hierarchical
D) Cluster
A

B) Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following is the most commonly used client/server network topology?
A) Star
B) Cluster
C) Ring
D) Hierarchical
A

A) Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
In an Ethernet network, the signal that is sent to indicate a signal collision is called a \_\_\_\_\_\_\_\_ signal.
A) hit
B) crash
C) stop
D) jam
A

D) jam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A \_\_\_\_\_\_\_\_ topology uses more than one topology when building a network.
A) hybrid
B) multiple-use
C) fusion
D) crossover
A

A) hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
\_\_\_\_\_\_\_\_ is the amount of data that can be transmitted across a transmission medium in a certain amount of time.
A) Data capacity
B) Scalability
C) Bandwidth
D) Infusion
A

C) Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following is NOT a factor to consider when selecting network cabling?
A) Cable diameter
B) Interference
C) Maximum run length
D) Bandwidth
A

A) Cable diameter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
\_\_\_\_\_\_\_\_ cable is NOT subject to electromagnetic interference or radio frequency interference.
A) Twisted-pair
B) Fiber-optic
C) Polycarbonate
D) Coaxial
A

B) Fiber-optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
For business networks, which of the following is NOT a main cable type?
A) Twisted-pair
B) Duplex
C) Coaxial
D) Fiber-optic
A

B) Duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Most home networks use \_\_\_\_\_\_\_\_ cable, which is most susceptible to interference.
A) fiber-optic
B) unshielded twisted-pair
C) Wi-Fi
D) coaxial
A

B) unshielded twisted pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
\_\_\_\_\_\_\_\_ is the standard communications protocol used on most client/server networks.
A) Ethernet
B) NOS
C) TCP/IP
D) VPN
A

A) Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
The physical address assigned each network adapter is called its \_\_\_\_\_\_\_\_.
A) network access control (NAC)
B) physical address control (PAC)
C) network physical address (NPA)
D) media access control (MAC)
A

D) media access control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
A \_\_\_\_\_\_\_\_ sends data from one collision domain to another.
A) switch
B) bridge
C) link
D) router
A

B) bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
A \_\_\_\_\_\_\_\_ sends data between two networks.
A) repeater
B) switch
C) hub
D) router
A

D) router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
A \_\_\_\_\_\_\_\_ keeps your computer safe by determining who is trying to access it.
A) gateway
B) firewall
C) hub
D) switch
A

B) firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
Packet \_\_\_\_\_\_\_\_ is a form of protection for your computer that looks at each packet that comes into your computer network.
A) viewing
B) sniffing
C) scanning
D) screening
A

D) screening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
A(n) \_\_\_\_\_\_\_\_ server is a heavily secured server located between a company's secure internal network and its firewall.
A) transitional
B) armored
C) bastion host
D) proxy
A

C) bastion host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a \_\_\_\_\_\_\_\_.
A) brute force attack
B) spammer
C) worm
D) Trojan horse
A

A) brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A(n) ________ network is often the type of network that is set up in a home or very small business.

A

P2P - peer-to-peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

________ means that additional users can easily be added without affecting the performance of the other network nodes.

A

Scalability

28
Q

A(n) ________ is made up of two or more LANs that are miles apart.

A

WAN - wide area network

29
Q

A(n) ________ is used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters.

A

intranet

30
Q

_______ technology places data packets inside other data packets.

A

Tunneling

31
Q

A(n) ________ is an area of an intranet to which only certain corporations or individuals can access.

A

Extranet

32
Q

A(n) ________ server is maintained by a hosting company and is connected to networks using the Internet.

A

cloud

33
Q

A(n) ________ server is a server used to fulfill one specific purpose.

A

dedicated

34
Q

A library book reservation service is a good example of a use for a(n) ________ server.

A

database

35
Q

A(n) ________ server is used to host an Internet site.

A

web

36
Q

A ring topology is also known as a(n) ________ topology.

A

loop

37
Q

Because of its centralized design, a(n) ________ topology is the simplest to troubleshoot and repair.

A

star

38
Q

Fluorescent lights and machinery with motors or transformers are common sources of ________ emissions.

A

EMI - electromagnetic interference

39
Q

________ interference is a type of network interference for cable transmission media that can be caused by nearby television or radio signals.

A

RF - radio frequency

40
Q

A(n) ________ cable contains a glass or plastic core.

A

fiber-optic

41
Q

________ cable is the most costly to install.

A

fiber-optic

42
Q

A(n) ________ provides wireless devices with a sending and receiving connection point to the network.

A

WAP - wireless access point

43
Q

NIC stands for ________.

A

network interference card

44
Q

A(n) ________ is a group of data packets that are sent together.

A

frame

45
Q

A(n) ________ is a device that reads information from a magnetic strip on the back of a credit card-like identification card.

A

card reader

46
Q

________ is the process that requires users to prove that they have permission to access a computer network.

A

authentication

47
Q

A(n) ________ can often be equipped to act as a hardware firewall.

A

router

48
Q

A(n) ________ server acts as a liaison between an internal network and an external network.

A

proxy

49
Q

Retinal scanning is an example of ________ authentication.

A

biometric

50
Q

Identification badges and smart keys are examples of ________ objects that users carry to identify themselves and that allow them access to a computer system or computer facility.

A

possessed

51
Q

P2P networks are very difficult to administer when they have large numbers of users.

A

TRUE

52
Q

In a client/server network, each network node communicates directly with every other node on the network.

A

FALSE

53
Q

An international company like Microsoft would use a MAN to connect all of its computers.

A

FALSE

54
Q

Data flows in both directions in a ring network.

A

FALSE

55
Q

In an active topology, each node helps to move data through a network.

A

TRUE

56
Q

Transmission media comprise the physical system that data takes to flow between devices on the network.

A

TRUE

57
Q

Since data transmissions can pass through fiber-optic cable in only one direction, at least two fibers are required to enable transmission of data in both directions.

A

TRUE

58
Q

Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.

A

TRUE

59
Q

MAC addresses are restricted to Macintosh computers.

A

FALSE

60
Q

A bridge sends information between two networks.

A

FALSE

61
Q

Worms often try to disguise from where they are sending data by using a bogus IP addresses instead of using an authorized IP address belonging to the network.

A

FALSE

62
Q
Match each of the following dedicated servers to its function:
I.	authentication
II.	web
III.	cloud
IV.	database
V.	application

A. acts as a repository for application software
B. keeps track of user logins to the network and which services are available to each user
C. a server not physically located at a company’s site
D. allows client computers to access a database
E. hosts websites that can be accessed via the Internet

A

B, E, C, D, A

63
Q
Match each of the following terms to its definition:
I.	protocol
II.	token
III.	terminator
IV.	honey pot
V.	frame

A. special type of data packet
B. computer system designed to attract unauthorized users
C. device that absorbs a signal so that it is not reflected back
D. set of common rules that control communications among network devices
E. holds multiple data packets

A

D, A, C, B, E

64
Q
Match each of the following terms to its definition:
I.	NOS
II.	NIC
III.	CSMA/CD
IV.	P2P
V.	MAC address

A. adapter card that connects a computer to a network
B. used for internal identification on a network
C. an operating system for network servers
D. method used on Ethernet networks to avoid data collisions
E. network in which each node connected to the network communicates directly with every other node

A

C, A, D, E, B

65
Q
Match each of the following networks to its definition:
I.	WAN
II.	LAN
III.	MAN
IV.	PAN
V.	HAN

A. links users in a specific geographic area (usually a city)
B. network of two or more LANs
C. a network in a small geographic area
D. can be used for a small home-based business
E. used by a single individual connecting devices using wireless media

A

B, C, A, E, D

66
Q
Match each of the following terms to its definition:
I.	switch
II.	firewall
III.	router
IV.	bridge
V.	packet

A. data broken into a small segment with an address to which it is sent
B. makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
C. software or hardware that prevents unauthorized entry to a network
D. sends data between different collision domains
E. device that sends information between two networks

A

B, C, E, D, A