Deck 12: Behind the Scenes: Networking and Security in the Business World

ملء الشاشة (f)
exit full mode
سؤال
A ________ uses the Internet communications infrastructure to build a secure and private network.

A) PAN
B) WAN
C) VPN
D) HAN
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The computers in a lab on a floor of a building would be connected using a ________.

A) WAN
B) LAN
C) MAN
D) PAN
سؤال
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.

A) hit
B) crash
C) stop
D) jam
سؤال
________ cable is NOT subject to electromagnetic interference or radio frequency interference.

A) Twisted-pair
B) Fiber-optic
C) Polycarbonate
D) Coaxial
سؤال
A ________ network can contain servers as well as individual computers.

A) client/server
B) peer-to-peer
C) switch
D) distributed
سؤال
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.

A) application
B) authentication
C) dedicated
D) file
سؤال
Which of the following is the most commonly used client/server network topology?

A) Star
B) Cluster
C) Ring
D) Hierarchical
سؤال
A ________ is a group of two or more computers, or nodes, designed to share information and resources.

A) router
B) bus
C) bridge
D) network
سؤال
________ is the amount of data that can be transmitted across a transmission medium in a certain amount of time.

A) Data capacity
B) Scalability
C) Bandwidth
D) Infusion
سؤال
A ________ is a set of rules for how information and communication are exchanged.

A) protocol
B) token
C) frame
D) packet
سؤال
Which of the following is NOT a factor to consider when selecting network cabling?

A) Cable diameter
B) Interference
C) Maximum run length
D) Bandwidth
سؤال
In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.

A) Star
B) Bus
C) Hierarchical
D) Cluster
سؤال
A(n) ________ server is a server that stores and manages files for network users.

A) file
B) e-mail
C) print
D) database
سؤال
A print server uses a print ________ as a software holding area for jobs waiting to be printed.

A) stack
B) spooler
C) logger
D) heap
سؤال
Ring networks use the ________ method to avoid data collisions.

A) packet screening
B) active-check
C) token
D) passive-check
سؤال
A ________ topology uses more than one topology when building a network.

A) hybrid
B) multiple-use
C) fusion
D) crossover
سؤال
For business networks, which of the following is NOT a main cable type?

A) Twisted-pair
B) Duplex
C) Coaxial
D) Fiber-optic
سؤال
In a ________ network, each node connected to the network communicates directly with every other node.

A) client/server
B) peer-to-peer
C) router
D) bridge
سؤال
Which of the following is NOT a common network topology?

A) Star
B) Cluster
C) Linear bus
D) Ring
سؤال
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.

A) endcap
B) terminator
C) stopper
D) block
سؤال
A library book reservation service is a good example of a use for a(n) ________ server.
سؤال
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.

A) viewing
B) sniffing
C) scanning
D) screening
سؤال
________ is the standard communications protocol used on most client/server networks.

A) Ethernet
B) NOS
C) TCP/IP
D) VPN
سؤال
A(n) ________ network is often the type of network that is set up in a home or very small business.
سؤال
A ________ sends data between two networks.

A) repeater
B) switch
C) hub
D) router
سؤال
________ technology places data packets inside other data packets.
سؤال
A ________ keeps your computer safe by determining who is trying to access it.

A) gateway
B) firewall
C) hub
D) switch
سؤال
A(n) ________ server is a server used to fulfill one specific purpose.
سؤال
A(n) ________ server is maintained by a hosting company and is connected to networks using the Internet.
سؤال
Most home networks use ________ cable, which is most susceptible to interference.

A) fiber-optic
B) unshielded twisted-pair
C) wi-fi
D) coaxial
سؤال
A(n) ________ is made up of two or more LANs that are miles apart.
سؤال
A(n) ________ server is used to host an Internet site.
سؤال
A(n) ________ address is the address that external entities use when communicating with your network.

A) ALU
B) MAC
C) WAP
D) IP
سؤال
________ means that additional users can easily be added without affecting the performance of the other network nodes.
سؤال
A(n) ________ server is a heavily secured server located between a company's secure internal network and its firewall.

A) transitional
B) armored
C) bastion host
D) proxy
سؤال
The physical address assigned each network adapter is called its ________.

A) network access control (NAC)
B) physical address control (PAC)
C) network physical address (NPA)
D) media access control (MAC)
سؤال
A(n) ________ is used exclusively within a corporation or organization.
سؤال
A ________ sends data from one collision domain to another.

A) switch
B) bridge
C) link
D) router
سؤال
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.

A) brute force attack
B) spammer
C) worm
D) Trojan horse
سؤال
A(n) ________ is an area of an intranet to which only certain external corporations or individuals have access.
سؤال
P2P networks become difficult to manage when they exceed five users.
سؤال
A(n) ________ server acts as a liaison between an internal network and an external network.
سؤال
________ cable is the most costly to install.
سؤال
________ is the process that requires users to prove that they have permission to access a computer network.
سؤال
________ interference is a type of network interference for cable transmission media that can be caused by nearby television or radio signals.
سؤال
Fluorescent lights and machinery with motors or transformers are common sources of ________ emissions.
سؤال
A(n) ________ provides wireless devices with a sending and receiving connection point to the network.
سؤال
Retinal scanning is an example of ________ authentication.
سؤال
Because of its centralized design, a(n) ________ topology is the simplest to troubleshoot and repair.
سؤال
In a client/server network, each network node communicates directly with every other node on the network.
سؤال
A(n) ________ can often be equipped to act as a hardware firewall.
سؤال
In an active topology, each node helps to move data through a network.
سؤال
A(n) ________ cable contains a glass or plastic core.
سؤال
Data flows in both directions in a ring network.
سؤال
Identification badges and smart keys are examples of ________ objects that users carry to identify themselves and that allow them access to a computer system or computer facility.
سؤال
A ring topology is also known as a(n) ________ topology.
سؤال
A(n) ________ is a device that reads information from a magnetic strip on the back of a credit card-like identification card.
سؤال
An international company like Microsoft would use a MAN to connect all of its computers.
سؤال
A(n) ________ is a group of data packets that are sent together.
سؤال
NIC stands for ________.
سؤال
A facial-recognition scanner is an example of a biometric authentication device.
سؤال
MAC addresses and IP addresses are the same thing.
سؤال
Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.
سؤال
Since data transmissions can pass through fiber-optic cable in only one direction, at least two fibers are required to enable transmission of data in both directions.
سؤال
Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.
سؤال
A bridge sends information between two networks.
سؤال
MAC addresses are restricted to Macintosh computers.
سؤال
Transmission media comprise the physical system that data take to flow between devices on the network.
سؤال
Worms often try to disguise from where they are sending data by using a bogus IP addresses instead of using an authorized IP address belonging to the network.
سؤال
A phishing attack is an attempt to access an account by repeatedly trying different passwords.
سؤال
Match between columns
packet
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
packet
software or hardware that prevents unauthorized entry
packet
device that sends information between two networks
packet
sends data between different collision domains
packet
data broken into a small segment with an address to which it is sent
firewall
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
firewall
software or hardware that prevents unauthorized entry
firewall
device that sends information between two networks
firewall
sends data between different collision domains
firewall
data broken into a small segment with an address to which it is sent
switch
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
switch
software or hardware that prevents unauthorized entry
switch
device that sends information between two networks
switch
sends data between different collision domains
switch
data broken into a small segment with an address to which it is sent
router
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
router
software or hardware that prevents unauthorized entry
router
device that sends information between two networks
router
sends data between different collision domains
router
data broken into a small segment with an address to which it is sent
bridge
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
bridge
software or hardware that prevents unauthorized entry
bridge
device that sends information between two networks
bridge
sends data between different collision domains
bridge
data broken into a small segment with an address to which it is sent
سؤال
Match between columns
MAN
network of two or more LANs
MAN
a network in a small geographic area
MAN
links users in a specific geographic area (usually a city)
MAN
used by a single individual connecting devices using wireless media
MAN
can be used for a small home-based business
HAN
network of two or more LANs
HAN
a network in a small geographic area
HAN
links users in a specific geographic area (usually a city)
HAN
used by a single individual connecting devices using wireless media
HAN
can be used for a small home-based business
PAN
network of two or more LANs
PAN
a network in a small geographic area
PAN
links users in a specific geographic area (usually a city)
PAN
used by a single individual connecting devices using wireless media
PAN
can be used for a small home-based business
LAN
network of two or more LANs
LAN
a network in a small geographic area
LAN
links users in a specific geographic area (usually a city)
LAN
used by a single individual connecting devices using wireless media
LAN
can be used for a small home-based business
WAN
network of two or more LANs
WAN
a network in a small geographic area
WAN
links users in a specific geographic area (usually a city)
WAN
used by a single individual connecting devices using wireless media
WAN
can be used for a small home-based business
سؤال
Match between columns
MAC address
an operating system for network servers
MAC address
adapter card that connects a computer to a network
MAC address
method used on Ethernet networks to avoid data collisions
MAC address
network in which each node connected to the network communicates directly with every other node
MAC address
used for internal identification on a network
CSMA/CD
an operating system for network servers
CSMA/CD
adapter card that connects a computer to a network
CSMA/CD
method used on Ethernet networks to avoid data collisions
CSMA/CD
network in which each node connected to the network communicates directly with every other node
CSMA/CD
used for internal identification on a network
P2P
an operating system for network servers
P2P
adapter card that connects a computer to a network
P2P
method used on Ethernet networks to avoid data collisions
P2P
network in which each node connected to the network communicates directly with every other node
P2P
used for internal identification on a network
NIC
an operating system for network servers
NIC
adapter card that connects a computer to a network
NIC
method used on Ethernet networks to avoid data collisions
NIC
network in which each node connected to the network communicates directly with every other node
NIC
used for internal identification on a network
NOS
an operating system for network servers
NOS
adapter card that connects a computer to a network
NOS
method used on Ethernet networks to avoid data collisions
NOS
network in which each node connected to the network communicates directly with every other node
NOS
used for internal identification on a network
سؤال
Match between columns
honey pot
set of common rules that control communications among network devices
honey pot
special type of data packet
honey pot
device that absorbs a signal so that it is not reflected back
honey pot
computer system designed to attract unauthorized users
honey pot
holds multiple data packets
token
set of common rules that control communications among network devices
token
special type of data packet
token
device that absorbs a signal so that it is not reflected back
token
computer system designed to attract unauthorized users
token
holds multiple data packets
frame
set of common rules that control communications among network devices
frame
special type of data packet
frame
device that absorbs a signal so that it is not reflected back
frame
computer system designed to attract unauthorized users
frame
holds multiple data packets
protocol
set of common rules that control communications among network devices
protocol
special type of data packet
protocol
device that absorbs a signal so that it is not reflected back
protocol
computer system designed to attract unauthorized users
protocol
holds multiple data packets
terminator
set of common rules that control communications among network devices
terminator
special type of data packet
terminator
device that absorbs a signal so that it is not reflected back
terminator
computer system designed to attract unauthorized users
terminator
holds multiple data packets
سؤال
Match between columns
authentication
keeps track of user logins to the network and which services are available to each user
authentication
hosts websites that can be accessed via the Internet
authentication
a server not physically located at a company's site
authentication
allows client computers to access a database
authentication
acts as a repository for application software
application
keeps track of user logins to the network and which services are available to each user
application
hosts websites that can be accessed via the Internet
application
a server not physically located at a company's site
application
allows client computers to access a database
application
acts as a repository for application software
cloud
keeps track of user logins to the network and which services are available to each user
cloud
hosts websites that can be accessed via the Internet
cloud
a server not physically located at a company's site
cloud
allows client computers to access a database
cloud
acts as a repository for application software
database
keeps track of user logins to the network and which services are available to each user
database
hosts websites that can be accessed via the Internet
database
a server not physically located at a company's site
database
allows client computers to access a database
database
acts as a repository for application software
web
keeps track of user logins to the network and which services are available to each user
web
hosts websites that can be accessed via the Internet
web
a server not physically located at a company's site
web
allows client computers to access a database
web
acts as a repository for application software
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/75
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Behind the Scenes: Networking and Security in the Business World
1
A ________ uses the Internet communications infrastructure to build a secure and private network.

A) PAN
B) WAN
C) VPN
D) HAN
C
2
The computers in a lab on a floor of a building would be connected using a ________.

A) WAN
B) LAN
C) MAN
D) PAN
B
3
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.

A) hit
B) crash
C) stop
D) jam
D
4
________ cable is NOT subject to electromagnetic interference or radio frequency interference.

A) Twisted-pair
B) Fiber-optic
C) Polycarbonate
D) Coaxial
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
5
A ________ network can contain servers as well as individual computers.

A) client/server
B) peer-to-peer
C) switch
D) distributed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
6
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.

A) application
B) authentication
C) dedicated
D) file
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following is the most commonly used client/server network topology?

A) Star
B) Cluster
C) Ring
D) Hierarchical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
8
A ________ is a group of two or more computers, or nodes, designed to share information and resources.

A) router
B) bus
C) bridge
D) network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
9
________ is the amount of data that can be transmitted across a transmission medium in a certain amount of time.

A) Data capacity
B) Scalability
C) Bandwidth
D) Infusion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
10
A ________ is a set of rules for how information and communication are exchanged.

A) protocol
B) token
C) frame
D) packet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is NOT a factor to consider when selecting network cabling?

A) Cable diameter
B) Interference
C) Maximum run length
D) Bandwidth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
12
In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.

A) Star
B) Bus
C) Hierarchical
D) Cluster
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
13
A(n) ________ server is a server that stores and manages files for network users.

A) file
B) e-mail
C) print
D) database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
14
A print server uses a print ________ as a software holding area for jobs waiting to be printed.

A) stack
B) spooler
C) logger
D) heap
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
15
Ring networks use the ________ method to avoid data collisions.

A) packet screening
B) active-check
C) token
D) passive-check
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
16
A ________ topology uses more than one topology when building a network.

A) hybrid
B) multiple-use
C) fusion
D) crossover
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
17
For business networks, which of the following is NOT a main cable type?

A) Twisted-pair
B) Duplex
C) Coaxial
D) Fiber-optic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
18
In a ________ network, each node connected to the network communicates directly with every other node.

A) client/server
B) peer-to-peer
C) router
D) bridge
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is NOT a common network topology?

A) Star
B) Cluster
C) Linear bus
D) Ring
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
20
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.

A) endcap
B) terminator
C) stopper
D) block
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
21
A library book reservation service is a good example of a use for a(n) ________ server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
22
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.

A) viewing
B) sniffing
C) scanning
D) screening
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
23
________ is the standard communications protocol used on most client/server networks.

A) Ethernet
B) NOS
C) TCP/IP
D) VPN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
24
A(n) ________ network is often the type of network that is set up in a home or very small business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
25
A ________ sends data between two networks.

A) repeater
B) switch
C) hub
D) router
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
26
________ technology places data packets inside other data packets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
27
A ________ keeps your computer safe by determining who is trying to access it.

A) gateway
B) firewall
C) hub
D) switch
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
28
A(n) ________ server is a server used to fulfill one specific purpose.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
29
A(n) ________ server is maintained by a hosting company and is connected to networks using the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
30
Most home networks use ________ cable, which is most susceptible to interference.

A) fiber-optic
B) unshielded twisted-pair
C) wi-fi
D) coaxial
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
31
A(n) ________ is made up of two or more LANs that are miles apart.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
32
A(n) ________ server is used to host an Internet site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
33
A(n) ________ address is the address that external entities use when communicating with your network.

A) ALU
B) MAC
C) WAP
D) IP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
34
________ means that additional users can easily be added without affecting the performance of the other network nodes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
35
A(n) ________ server is a heavily secured server located between a company's secure internal network and its firewall.

A) transitional
B) armored
C) bastion host
D) proxy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
36
The physical address assigned each network adapter is called its ________.

A) network access control (NAC)
B) physical address control (PAC)
C) network physical address (NPA)
D) media access control (MAC)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
37
A(n) ________ is used exclusively within a corporation or organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
38
A ________ sends data from one collision domain to another.

A) switch
B) bridge
C) link
D) router
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
39
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.

A) brute force attack
B) spammer
C) worm
D) Trojan horse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
40
A(n) ________ is an area of an intranet to which only certain external corporations or individuals have access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
41
P2P networks become difficult to manage when they exceed five users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
42
A(n) ________ server acts as a liaison between an internal network and an external network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
43
________ cable is the most costly to install.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
44
________ is the process that requires users to prove that they have permission to access a computer network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
45
________ interference is a type of network interference for cable transmission media that can be caused by nearby television or radio signals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
46
Fluorescent lights and machinery with motors or transformers are common sources of ________ emissions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
47
A(n) ________ provides wireless devices with a sending and receiving connection point to the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
48
Retinal scanning is an example of ________ authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
49
Because of its centralized design, a(n) ________ topology is the simplest to troubleshoot and repair.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
50
In a client/server network, each network node communicates directly with every other node on the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
51
A(n) ________ can often be equipped to act as a hardware firewall.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
52
In an active topology, each node helps to move data through a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
53
A(n) ________ cable contains a glass or plastic core.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
54
Data flows in both directions in a ring network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
55
Identification badges and smart keys are examples of ________ objects that users carry to identify themselves and that allow them access to a computer system or computer facility.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
56
A ring topology is also known as a(n) ________ topology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
57
A(n) ________ is a device that reads information from a magnetic strip on the back of a credit card-like identification card.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
58
An international company like Microsoft would use a MAN to connect all of its computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
59
A(n) ________ is a group of data packets that are sent together.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
60
NIC stands for ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
61
A facial-recognition scanner is an example of a biometric authentication device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
62
MAC addresses and IP addresses are the same thing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
63
Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
64
Since data transmissions can pass through fiber-optic cable in only one direction, at least two fibers are required to enable transmission of data in both directions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
65
Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
66
A bridge sends information between two networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
67
MAC addresses are restricted to Macintosh computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
68
Transmission media comprise the physical system that data take to flow between devices on the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
69
Worms often try to disguise from where they are sending data by using a bogus IP addresses instead of using an authorized IP address belonging to the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
70
A phishing attack is an attempt to access an account by repeatedly trying different passwords.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
71
Match between columns
packet
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
packet
software or hardware that prevents unauthorized entry
packet
device that sends information between two networks
packet
sends data between different collision domains
packet
data broken into a small segment with an address to which it is sent
firewall
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
firewall
software or hardware that prevents unauthorized entry
firewall
device that sends information between two networks
firewall
sends data between different collision domains
firewall
data broken into a small segment with an address to which it is sent
switch
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
switch
software or hardware that prevents unauthorized entry
switch
device that sends information between two networks
switch
sends data between different collision domains
switch
data broken into a small segment with an address to which it is sent
router
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
router
software or hardware that prevents unauthorized entry
router
device that sends information between two networks
router
sends data between different collision domains
router
data broken into a small segment with an address to which it is sent
bridge
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
bridge
software or hardware that prevents unauthorized entry
bridge
device that sends information between two networks
bridge
sends data between different collision domains
bridge
data broken into a small segment with an address to which it is sent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
72
Match between columns
MAN
network of two or more LANs
MAN
a network in a small geographic area
MAN
links users in a specific geographic area (usually a city)
MAN
used by a single individual connecting devices using wireless media
MAN
can be used for a small home-based business
HAN
network of two or more LANs
HAN
a network in a small geographic area
HAN
links users in a specific geographic area (usually a city)
HAN
used by a single individual connecting devices using wireless media
HAN
can be used for a small home-based business
PAN
network of two or more LANs
PAN
a network in a small geographic area
PAN
links users in a specific geographic area (usually a city)
PAN
used by a single individual connecting devices using wireless media
PAN
can be used for a small home-based business
LAN
network of two or more LANs
LAN
a network in a small geographic area
LAN
links users in a specific geographic area (usually a city)
LAN
used by a single individual connecting devices using wireless media
LAN
can be used for a small home-based business
WAN
network of two or more LANs
WAN
a network in a small geographic area
WAN
links users in a specific geographic area (usually a city)
WAN
used by a single individual connecting devices using wireless media
WAN
can be used for a small home-based business
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
73
Match between columns
MAC address
an operating system for network servers
MAC address
adapter card that connects a computer to a network
MAC address
method used on Ethernet networks to avoid data collisions
MAC address
network in which each node connected to the network communicates directly with every other node
MAC address
used for internal identification on a network
CSMA/CD
an operating system for network servers
CSMA/CD
adapter card that connects a computer to a network
CSMA/CD
method used on Ethernet networks to avoid data collisions
CSMA/CD
network in which each node connected to the network communicates directly with every other node
CSMA/CD
used for internal identification on a network
P2P
an operating system for network servers
P2P
adapter card that connects a computer to a network
P2P
method used on Ethernet networks to avoid data collisions
P2P
network in which each node connected to the network communicates directly with every other node
P2P
used for internal identification on a network
NIC
an operating system for network servers
NIC
adapter card that connects a computer to a network
NIC
method used on Ethernet networks to avoid data collisions
NIC
network in which each node connected to the network communicates directly with every other node
NIC
used for internal identification on a network
NOS
an operating system for network servers
NOS
adapter card that connects a computer to a network
NOS
method used on Ethernet networks to avoid data collisions
NOS
network in which each node connected to the network communicates directly with every other node
NOS
used for internal identification on a network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
74
Match between columns
honey pot
set of common rules that control communications among network devices
honey pot
special type of data packet
honey pot
device that absorbs a signal so that it is not reflected back
honey pot
computer system designed to attract unauthorized users
honey pot
holds multiple data packets
token
set of common rules that control communications among network devices
token
special type of data packet
token
device that absorbs a signal so that it is not reflected back
token
computer system designed to attract unauthorized users
token
holds multiple data packets
frame
set of common rules that control communications among network devices
frame
special type of data packet
frame
device that absorbs a signal so that it is not reflected back
frame
computer system designed to attract unauthorized users
frame
holds multiple data packets
protocol
set of common rules that control communications among network devices
protocol
special type of data packet
protocol
device that absorbs a signal so that it is not reflected back
protocol
computer system designed to attract unauthorized users
protocol
holds multiple data packets
terminator
set of common rules that control communications among network devices
terminator
special type of data packet
terminator
device that absorbs a signal so that it is not reflected back
terminator
computer system designed to attract unauthorized users
terminator
holds multiple data packets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
75
Match between columns
authentication
keeps track of user logins to the network and which services are available to each user
authentication
hosts websites that can be accessed via the Internet
authentication
a server not physically located at a company's site
authentication
allows client computers to access a database
authentication
acts as a repository for application software
application
keeps track of user logins to the network and which services are available to each user
application
hosts websites that can be accessed via the Internet
application
a server not physically located at a company's site
application
allows client computers to access a database
application
acts as a repository for application software
cloud
keeps track of user logins to the network and which services are available to each user
cloud
hosts websites that can be accessed via the Internet
cloud
a server not physically located at a company's site
cloud
allows client computers to access a database
cloud
acts as a repository for application software
database
keeps track of user logins to the network and which services are available to each user
database
hosts websites that can be accessed via the Internet
database
a server not physically located at a company's site
database
allows client computers to access a database
database
acts as a repository for application software
web
keeps track of user logins to the network and which services are available to each user
web
hosts websites that can be accessed via the Internet
web
a server not physically located at a company's site
web
allows client computers to access a database
web
acts as a repository for application software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.