CIS 204 Chapter 12 Quiz

question

Network adapters send data packets based on a(n)
answer

MAC address
question

The computers in a lab on a floor of a building would be connected using a ____
answer

LAN
question

a ___ is a group of two or more computers, or nodes, designed to share information and resources
answer

network
question

In a ___ network, data collisions can occur fairly easily because the network is essentially composed of a single cable
answer

Bus
question

___ cable is NOT subject to electromagnetic interference or radio frequency interference
answer

fiber-optic
question

A(n) ___ server is a server that stores an manages files for network users
answer

file
question

A ___ uses the Internet communications infrastructure to build a secure and private network
answer

VPN
question

Which of the following is an advantage of installing a client/server network in a business?
answer

centralization of network security protection
question

Which of the following is the most commonly used client/server network topology?
answer

Star
question

A ___ sends data between two networks
answer

router
question

Providing adequate security on a corporate network involves all of the following issues except
answer

proprietary software lockout
question

A(n) ____ address is the address that external entities use when communicating with your network
answer

IP
question

For business networks, which of the following is NOT a main cable type?
answer

Duplex
question

____ provides the capacity for troops on the ground to communicate with each other by routing signals through advanced sensor and targeting pods aboard military aircraft
answer

Net-T
question

A print server uses a print ___ as a software holding area for jobs waiting to be printed
answer

spooler
question

A ___ sends data from one collision domain to another
answer

bridge
question

A ___ topology uses more than one topology when building a network
answer

hybrid
question

Which of the following is NOT a factor to consider when selecting network cabling?
answer

Cable diameter
question

A(n) ____ server tracks who is logging on to the network as well as which services on the network are available to each user
answer

authenticiation
question

Ring networks use the ___ method to avoid data collisions
answer

token
question

___ is the amount of data that can be transmitted across a transmission medium in a certain amount of time
answer

Bandwith
question

Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a
answer

brute force attack
question

Which of the following is a private network set up by a business that’s used exclusively by a select group of employees and suppliers?
answer

Intranet
question

A ___ is a set of rules for how information and communication are exchanged
answer

protocol
question

A(n) ___ server tracks who is logging on to the networks as well as which services on the network are available to each user
answer

authentication
question

Why are p2p networks not usually installed in businesses?
answer

Security is stronger on client/server networks
question

Most home networks use ___ cable, which is most susceptible to interference
answer

unshielded twisted-pair
question

The ends of the cable in a bus network use a(n) ___ to absorb signals so that they are not reflected back to network components that have already received the signals.
answer

Terminator
question

____ is the standard communications protocol used on most client/server networks
answer

Ethernet
question

In an Ethernet network, the signal that is sent to indicate a signal collision is called a ____ signal
answer

jam
question

Packet ____ is a form of protection for your computer that looks at each packet that comes into your computer network
answer

screening
question

A(n) ____ server is a heavily secured server located between a company’s secure internal network and its firewall
answer

bastion host
question

In a ___ network, each node connected to the network communicates directly with every other node
answer

peer-to-peer
question

A ___ keeps your computer safe by determining who is trying to access it
answer

firewall
question

The physical address assigned to each network adaptor is called its ____
answer

Media access control (MAC)

Get instant access to
all materials

Become a Member