Chapter 12 - Behind the Scenes: Networking and Security in the Business World Flashcards
1
Q
A \_\_\_\_\_\_\_\_ network can contain servers as well as individual computers. A) client/server B) peer-to-peer C) switch D) star
A
A) client/server
2
Q
In a \_\_\_\_\_\_\_\_ network, each node connected to the network communicates directly with every other node. A) client/server B) peer-to-peer C) router D) bridge
A
B) peer-to-peer
3
Q
A \_\_\_\_\_\_\_\_ uses the Internet communications infrastructure to build a secure and private network. A) PAN B) WAN C) VPN D) HAN
A
C) VPN
4
Q
A(n) \_\_\_\_\_\_\_\_ server tracks who is logging on to the network as well as which services on the network are available to each user. A) application B) authentication C) dedicated D) file
A
B) authentication
5
Q
A print server uses a print \_\_\_\_\_\_\_\_ as a software holding area for jobs waiting to be printed. A) stack B) spooler C) logger D) heap
A
B) spooler
6
Q
Which of the following is NOT a common network topology? A) Star B) Cluster C) Linear bus D) Ring
A
B) Cluster
7
Q
Ring networks use the \_\_\_\_\_\_\_\_ method to avoid data collisions. A) packet screening B) active-check C) token D) passive-check
A
C) token
8
Q
The ends of the cable in a bus network use a(n) \_\_\_\_\_\_\_\_ to absorb signals so that they are not reflected back to network components that have already received the signals. A) endcap B) terminator C) stopper D) block
A
B) terminator
9
Q
In a \_\_\_\_\_\_\_\_ network, data collisions can occur fairly easily because the network is essentially composed of a single cable. A) Star B) Bus C) Hierarchical D) Cluster
A
B) Bus
10
Q
Which of the following is the most commonly used client/server network topology? A) Star B) Cluster C) Ring D) Hierarchical
A
A) Star
11
Q
In an Ethernet network, the signal that is sent to indicate a signal collision is called a \_\_\_\_\_\_\_\_ signal. A) hit B) crash C) stop D) jam
A
D) jam
12
Q
A \_\_\_\_\_\_\_\_ topology uses more than one topology when building a network. A) hybrid B) multiple-use C) fusion D) crossover
A
A) hybrid
13
Q
\_\_\_\_\_\_\_\_ is the amount of data that can be transmitted across a transmission medium in a certain amount of time. A) Data capacity B) Scalability C) Bandwidth D) Infusion
A
C) Bandwidth
14
Q
Which of the following is NOT a factor to consider when selecting network cabling? A) Cable diameter B) Interference C) Maximum run length D) Bandwidth
A
A) Cable diameter
15
Q
\_\_\_\_\_\_\_\_ cable is NOT subject to electromagnetic interference or radio frequency interference. A) Twisted-pair B) Fiber-optic C) Polycarbonate D) Coaxial
A
B) Fiber-optic
16
Q
For business networks, which of the following is NOT a main cable type? A) Twisted-pair B) Duplex C) Coaxial D) Fiber-optic
A
B) Duplex
17
Q
Most home networks use \_\_\_\_\_\_\_\_ cable, which is most susceptible to interference. A) fiber-optic B) unshielded twisted-pair C) Wi-Fi D) coaxial
A
B) unshielded twisted pair
18
Q
\_\_\_\_\_\_\_\_ is the standard communications protocol used on most client/server networks. A) Ethernet B) NOS C) TCP/IP D) VPN
A
A) Ethernet
19
Q
The physical address assigned each network adapter is called its \_\_\_\_\_\_\_\_. A) network access control (NAC) B) physical address control (PAC) C) network physical address (NPA) D) media access control (MAC)
A
D) media access control (MAC)
20
Q
A \_\_\_\_\_\_\_\_ sends data from one collision domain to another. A) switch B) bridge C) link D) router
A
B) bridge
21
Q
A \_\_\_\_\_\_\_\_ sends data between two networks. A) repeater B) switch C) hub D) router
A
D) router
22
Q
A \_\_\_\_\_\_\_\_ keeps your computer safe by determining who is trying to access it. A) gateway B) firewall C) hub D) switch
A
B) firewall
23
Q
Packet \_\_\_\_\_\_\_\_ is a form of protection for your computer that looks at each packet that comes into your computer network. A) viewing B) sniffing C) scanning D) screening
A
D) screening
24
Q
A(n) \_\_\_\_\_\_\_\_ server is a heavily secured server located between a company's secure internal network and its firewall. A) transitional B) armored C) bastion host D) proxy
A
C) bastion host
25
Q
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a \_\_\_\_\_\_\_\_. A) brute force attack B) spammer C) worm D) Trojan horse
A
A) brute force attack
26
Q
A(n) ________ network is often the type of network that is set up in a home or very small business.
A
P2P - peer-to-peer