Deck 12: Behind the Scenes: Networking and Security in the Business World

Full screen (f)
exit full mode
Question
A print server uses a print ________ as a software holding area for jobs waiting to be printed.

A) stack
B) spooler
C) logger
D) heap
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following is NOT a major factor to consider when selecting network cabling?

A) Cable diameter
B) Interference
C) Maximum run length
D) Bandwidth
Question
A ________ uses the Internet communications infrastructure to build a secure and private network.

A) PAN
B) WAN
C) VPN
D) HAN
Question
A(n) ________ server is a server that stores and manages files for network users.

A) file
B) e-mail
C) print
D) database
Question
________ cable is NOT subject to electromagnetic interference or radio frequency interference.

A) Twisted-pair
B) Fiber-optic
C) Polycarbonate
D) Coaxial
Question
A ________ network can contain servers as well as individual computers.

A) client/server
B) peer-to-peer
C) switch
D) bridge
Question
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.

A) hit
B) crash
C) stop
D) jam
Question
Cars often have ________ connectivity.

A) Wi-Fi and Bluetooth
B) ROVER-5 and ethernet
C) IPv7 and IPv6
D) Exhaust and fuel injection
Question
Ring networks use the ________ method to avoid data collisions.

A) packet screening
B) active-check
C) token
D) passive-check
Question
Which of the following is the most commonly used client/server network topology?

A) Star
B) Cluster
C) Ring
D) Hierarchical
Question
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.

A) application
B) authentication
C) dedicated
D) file
Question
A ________ topology uses more than one type of topology when building a network.

A) hybrid
B) multiple-use
C) fusion
D) crossover
Question
The computers in a lab on a floor of a building would be connected using a ________.

A) WAN
B) LAN
C) MAN
D) PAN
Question
A ________ is a group of two or more computers, or nodes, configured to share information and resources.

A) router
B) bus
C) bridge
D) network
Question
In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.

A) star
B) bus
C) hierarchical
D) cluster
Question
________ is the amount of data that can be transmitted across a transmission medium measured in bits per second.

A) Data capacity
B) Scalability
C) Bandwidth
D) Infusion
Question
Which of the following is NOT a common network topology?

A) Star
B) Cluster
C) Linear bus
D) Ring
Question
A network ________ is a set of rules for how information and communications are exchanged.

A) protocol
B) token
C) frame
D) packet
Question
In a ________ network, each node connected to the network communicates directly with every other node.

A) client/server
B) peer-to-peer
C) router
D) bridge
Question
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.

A) endcap
B) terminator
C) stopper
D) block
Question
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.

A) viewing
B) examination
C) scanning
D) screening
Question
A(n) ________ server is maintained by a hosting company and is connected to an internal network using the Internet.
Question
A ________ sends data from one collision domain to another.

A) switch
B) bridge
C) link
D) router
Question
A library book reservation service is a good example of a use for a(n) ________ server.
Question
A(n) ________ address is the address that external entities use when communicating with your network.

A) ALU
B) MAC
C) WAP
D) IP
Question
A(n) ________ server is a server used to fulfill one specific purpose.
Question
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.

A) brute force attack
B) spammer
C) worm
D) Trojan horse
Question
Most wired home networks use ________ cable, which is most susceptible to interference.

A) fiber-optic
B) unshielded twisted-pair
C) Wi-Fi
D) coaxial
Question
A ________ sends information between two networks.

A) repeater
B) switch
C) bridge
D) router
Question
A(n) ________ network is often the type of network that is set up in a home or very small business.
Question
A ________ keeps your computer safe by determining who is trying to access it.

A) gateway
B) firewall
C) hub
D) switch
Question
For business networks, which of the following is NOT one of the main cable types?

A) Twisted-pair
B) Polyvinyl
C) Coaxial
D) Fiber-optic
Question
The physical address assigned to each network adapter is called its ________ address.

A) network access control (NAC)
B) physical address control (PAC)
C) network physical address (NPA)
D) media access control (MAC)
Question
A(n) ________ is a private network that is used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters.
Question
________ technology for a VPN places data packets inside other data packets.
Question
A(n) ________ is an area of an intranet to which only certain external users have access.
Question
________ is the standard communications protocol used on most client/server networks.

A) Ethernet
B) NOS
C) Mac
D) VPN
Question
A(n) ________ is made up of two or more LANs that are miles apart.
Question
________ means that additional users can easily be added to a network without affecting the performance of the other network nodes.
Question
A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall.

A) transitional
B) iron-clad
C) bastion host
D) proxy
Question
________ is the process that requires users to prove that they have permission to access a computer network.
Question
In networking terminology, NIC stands for ________.
Question
A ring topology is also known as a(n) ________ topology.
Question
Fluorescent lights and machinery with motors or transformers are common sources of ________ emissions.
Question
A(n) ________ server acts as a liaison between an internal network and an external network.
Question
________ network cable is the most costly to install.
Question
In a client/server network, each network node communicates directly with every other node on the network.
Question
________ is a type of network interference for cable transmission media that can be caused by nearby television or radio signals.
Question
An international company like Microsoft would use a MAN to connect all of its computers.
Question
A(n) ________ is a device that reads information from a magnetic strip on the back of a credit card-like identification card.
Question
Retinal scanning is an example of ________ authentication.
Question
A(n) ________ can often be equipped to act as a hardware firewall.
Question
A(n) ________ network cable contains a glass or plastic core.
Question
A(n) ________ server is used to host an Internet site.
Question
Identification badges and smart keys are examples of ________ objects that users carry to identify themselves and that allow them access to a computer system or computer facility.
Question
Data flows in both directions around the ring in a ring network.
Question
A(n) ________ provides wireless devices with a sending and receiving connection point to the network.
Question
P2P networks become difficult to administer when they have large numbers of users.
Question
A(n) ________ is a container that can hold multiple data packets that are sent together.
Question
Because of its centralized design, a(n) ________ topology is the simplest to troubleshoot and repair.
Question
Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.
Question
A facial-recognition scanner is an example of a biometric authentication device.
Question
MAC addresses and IP addresses are the same thing.
Question
Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.
Question
MAC addresses are restricted to Macintosh computers.
Question
Transmission media comprise the system that data takes to flow between devices on the network.
Question
A phishing attack is an attempt to access an account by repeatedly trying different passwords.
Question
A bridge sends information between two networks.
Question
In an active topology, each node helps to move data through a network.
Question
Worms often try to disguise their origins by using a bogus IP address instead of using an authorized IP address belonging to the network.
Question
Since data transmissions can pass through fiber-optic cable in only one direction, at least two fibers are required to enable transmission of data in both directions.
Question
Match between columns
cloud
keeps track of user logins to the network and which services are available to each user
cloud
hosts websites that can be accessed via the Internet
cloud
a server not physically located at a company's site but accessed through the Internet
cloud
allows client computers to access a database
cloud
acts as a repository for application software
database
keeps track of user logins to the network and which services are available to each user
database
hosts websites that can be accessed via the Internet
database
a server not physically located at a company's site but accessed through the Internet
database
allows client computers to access a database
database
acts as a repository for application software
web
keeps track of user logins to the network and which services are available to each user
web
hosts websites that can be accessed via the Internet
web
a server not physically located at a company's site but accessed through the Internet
web
allows client computers to access a database
web
acts as a repository for application software
authentication
keeps track of user logins to the network and which services are available to each user
authentication
hosts websites that can be accessed via the Internet
authentication
a server not physically located at a company's site but accessed through the Internet
authentication
allows client computers to access a database
authentication
acts as a repository for application software
application
keeps track of user logins to the network and which services are available to each user
application
hosts websites that can be accessed via the Internet
application
a server not physically located at a company's site but accessed through the Internet
application
allows client computers to access a database
application
acts as a repository for application software
Question
Match between columns
terminator
set of common rules that control communications among network devices
terminator
special type of data packet
terminator
device that absorbs a signal so that it is not reflected back
terminator
computer system designed to attract unauthorized users
terminator
holds multiple data packets
token
set of common rules that control communications among network devices
token
special type of data packet
token
device that absorbs a signal so that it is not reflected back
token
computer system designed to attract unauthorized users
token
holds multiple data packets
honey pot
set of common rules that control communications among network devices
honey pot
special type of data packet
honey pot
device that absorbs a signal so that it is not reflected back
honey pot
computer system designed to attract unauthorized users
honey pot
holds multiple data packets
frame
set of common rules that control communications among network devices
frame
special type of data packet
frame
device that absorbs a signal so that it is not reflected back
frame
computer system designed to attract unauthorized users
frame
holds multiple data packets
protocol
set of common rules that control communications among network devices
protocol
special type of data packet
protocol
device that absorbs a signal so that it is not reflected back
protocol
computer system designed to attract unauthorized users
protocol
holds multiple data packets
Question
Match between columns
NIC
an operating system for network servers
NIC
adapter card that connects a computer to a network
NIC
method used on Ethernet networks to avoid data collisions
NIC
network in which each node connected to the network communicates directly with every other node
NIC
used for internal identification of nodes on a network
P2P
an operating system for network servers
P2P
adapter card that connects a computer to a network
P2P
method used on Ethernet networks to avoid data collisions
P2P
network in which each node connected to the network communicates directly with every other node
P2P
used for internal identification of nodes on a network
CSMA/CD
an operating system for network servers
CSMA/CD
adapter card that connects a computer to a network
CSMA/CD
method used on Ethernet networks to avoid data collisions
CSMA/CD
network in which each node connected to the network communicates directly with every other node
CSMA/CD
used for internal identification of nodes on a network
MAC address
an operating system for network servers
MAC address
adapter card that connects a computer to a network
MAC address
method used on Ethernet networks to avoid data collisions
MAC address
network in which each node connected to the network communicates directly with every other node
MAC address
used for internal identification of nodes on a network
NOS
an operating system for network servers
NOS
adapter card that connects a computer to a network
NOS
method used on Ethernet networks to avoid data collisions
NOS
network in which each node connected to the network communicates directly with every other node
NOS
used for internal identification of nodes on a network
Question
Match between columns
PAN
network of two or more LANs
PAN
a network in a small geographic area
PAN
links users in a specific geographic area (usually a city)
PAN
used by a single individual connecting devices using wireless media
PAN
can be used for a small home-based business
LAN
network of two or more LANs
LAN
a network in a small geographic area
LAN
links users in a specific geographic area (usually a city)
LAN
used by a single individual connecting devices using wireless media
LAN
can be used for a small home-based business
WAN
network of two or more LANs
WAN
a network in a small geographic area
WAN
links users in a specific geographic area (usually a city)
WAN
used by a single individual connecting devices using wireless media
WAN
can be used for a small home-based business
MAN
network of two or more LANs
MAN
a network in a small geographic area
MAN
links users in a specific geographic area (usually a city)
MAN
used by a single individual connecting devices using wireless media
MAN
can be used for a small home-based business
HAN
network of two or more LANs
HAN
a network in a small geographic area
HAN
links users in a specific geographic area (usually a city)
HAN
used by a single individual connecting devices using wireless media
HAN
can be used for a small home-based business
Question
Match between columns
switch
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
switch
software or hardware that prevents unauthorized entry to a network
switch
device that sends information between two networks
switch
sends data between different collision domains on a single network
switch
data broken into a small segment with an address to which it is sent
router
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
router
software or hardware that prevents unauthorized entry to a network
router
device that sends information between two networks
router
sends data between different collision domains on a single network
router
data broken into a small segment with an address to which it is sent
firewall
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
firewall
software or hardware that prevents unauthorized entry to a network
firewall
device that sends information between two networks
firewall
sends data between different collision domains on a single network
firewall
data broken into a small segment with an address to which it is sent
packet
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
packet
software or hardware that prevents unauthorized entry to a network
packet
device that sends information between two networks
packet
sends data between different collision domains on a single network
packet
data broken into a small segment with an address to which it is sent
bridge
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
bridge
software or hardware that prevents unauthorized entry to a network
bridge
device that sends information between two networks
bridge
sends data between different collision domains on a single network
bridge
data broken into a small segment with an address to which it is sent
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/76
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Behind the Scenes: Networking and Security in the Business World
1
A print server uses a print ________ as a software holding area for jobs waiting to be printed.

A) stack
B) spooler
C) logger
D) heap
B
2
Which of the following is NOT a major factor to consider when selecting network cabling?

A) Cable diameter
B) Interference
C) Maximum run length
D) Bandwidth
A
3
A ________ uses the Internet communications infrastructure to build a secure and private network.

A) PAN
B) WAN
C) VPN
D) HAN
C
4
A(n) ________ server is a server that stores and manages files for network users.

A) file
B) e-mail
C) print
D) database
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
5
________ cable is NOT subject to electromagnetic interference or radio frequency interference.

A) Twisted-pair
B) Fiber-optic
C) Polycarbonate
D) Coaxial
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
6
A ________ network can contain servers as well as individual computers.

A) client/server
B) peer-to-peer
C) switch
D) bridge
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
7
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.

A) hit
B) crash
C) stop
D) jam
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
8
Cars often have ________ connectivity.

A) Wi-Fi and Bluetooth
B) ROVER-5 and ethernet
C) IPv7 and IPv6
D) Exhaust and fuel injection
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
9
Ring networks use the ________ method to avoid data collisions.

A) packet screening
B) active-check
C) token
D) passive-check
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is the most commonly used client/server network topology?

A) Star
B) Cluster
C) Ring
D) Hierarchical
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
11
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.

A) application
B) authentication
C) dedicated
D) file
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
12
A ________ topology uses more than one type of topology when building a network.

A) hybrid
B) multiple-use
C) fusion
D) crossover
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
13
The computers in a lab on a floor of a building would be connected using a ________.

A) WAN
B) LAN
C) MAN
D) PAN
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
14
A ________ is a group of two or more computers, or nodes, configured to share information and resources.

A) router
B) bus
C) bridge
D) network
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
15
In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.

A) star
B) bus
C) hierarchical
D) cluster
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
16
________ is the amount of data that can be transmitted across a transmission medium measured in bits per second.

A) Data capacity
B) Scalability
C) Bandwidth
D) Infusion
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is NOT a common network topology?

A) Star
B) Cluster
C) Linear bus
D) Ring
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
18
A network ________ is a set of rules for how information and communications are exchanged.

A) protocol
B) token
C) frame
D) packet
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
19
In a ________ network, each node connected to the network communicates directly with every other node.

A) client/server
B) peer-to-peer
C) router
D) bridge
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
20
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.

A) endcap
B) terminator
C) stopper
D) block
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
21
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.

A) viewing
B) examination
C) scanning
D) screening
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
22
A(n) ________ server is maintained by a hosting company and is connected to an internal network using the Internet.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
23
A ________ sends data from one collision domain to another.

A) switch
B) bridge
C) link
D) router
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
24
A library book reservation service is a good example of a use for a(n) ________ server.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
25
A(n) ________ address is the address that external entities use when communicating with your network.

A) ALU
B) MAC
C) WAP
D) IP
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
26
A(n) ________ server is a server used to fulfill one specific purpose.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
27
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.

A) brute force attack
B) spammer
C) worm
D) Trojan horse
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
28
Most wired home networks use ________ cable, which is most susceptible to interference.

A) fiber-optic
B) unshielded twisted-pair
C) Wi-Fi
D) coaxial
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
29
A ________ sends information between two networks.

A) repeater
B) switch
C) bridge
D) router
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
30
A(n) ________ network is often the type of network that is set up in a home or very small business.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
31
A ________ keeps your computer safe by determining who is trying to access it.

A) gateway
B) firewall
C) hub
D) switch
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
32
For business networks, which of the following is NOT one of the main cable types?

A) Twisted-pair
B) Polyvinyl
C) Coaxial
D) Fiber-optic
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
33
The physical address assigned to each network adapter is called its ________ address.

A) network access control (NAC)
B) physical address control (PAC)
C) network physical address (NPA)
D) media access control (MAC)
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
34
A(n) ________ is a private network that is used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
35
________ technology for a VPN places data packets inside other data packets.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
36
A(n) ________ is an area of an intranet to which only certain external users have access.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
37
________ is the standard communications protocol used on most client/server networks.

A) Ethernet
B) NOS
C) Mac
D) VPN
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
38
A(n) ________ is made up of two or more LANs that are miles apart.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
39
________ means that additional users can easily be added to a network without affecting the performance of the other network nodes.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
40
A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall.

A) transitional
B) iron-clad
C) bastion host
D) proxy
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
41
________ is the process that requires users to prove that they have permission to access a computer network.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
42
In networking terminology, NIC stands for ________.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
43
A ring topology is also known as a(n) ________ topology.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
44
Fluorescent lights and machinery with motors or transformers are common sources of ________ emissions.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
45
A(n) ________ server acts as a liaison between an internal network and an external network.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
46
________ network cable is the most costly to install.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
47
In a client/server network, each network node communicates directly with every other node on the network.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
48
________ is a type of network interference for cable transmission media that can be caused by nearby television or radio signals.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
49
An international company like Microsoft would use a MAN to connect all of its computers.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
50
A(n) ________ is a device that reads information from a magnetic strip on the back of a credit card-like identification card.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
51
Retinal scanning is an example of ________ authentication.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
52
A(n) ________ can often be equipped to act as a hardware firewall.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
53
A(n) ________ network cable contains a glass or plastic core.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
54
A(n) ________ server is used to host an Internet site.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
55
Identification badges and smart keys are examples of ________ objects that users carry to identify themselves and that allow them access to a computer system or computer facility.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
56
Data flows in both directions around the ring in a ring network.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
57
A(n) ________ provides wireless devices with a sending and receiving connection point to the network.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
58
P2P networks become difficult to administer when they have large numbers of users.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
59
A(n) ________ is a container that can hold multiple data packets that are sent together.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
60
Because of its centralized design, a(n) ________ topology is the simplest to troubleshoot and repair.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
61
Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
62
A facial-recognition scanner is an example of a biometric authentication device.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
63
MAC addresses and IP addresses are the same thing.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
64
Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
65
MAC addresses are restricted to Macintosh computers.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
66
Transmission media comprise the system that data takes to flow between devices on the network.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
67
A phishing attack is an attempt to access an account by repeatedly trying different passwords.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
68
A bridge sends information between two networks.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
69
In an active topology, each node helps to move data through a network.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
70
Worms often try to disguise their origins by using a bogus IP address instead of using an authorized IP address belonging to the network.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
71
Since data transmissions can pass through fiber-optic cable in only one direction, at least two fibers are required to enable transmission of data in both directions.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
72
Match between columns
cloud
keeps track of user logins to the network and which services are available to each user
cloud
hosts websites that can be accessed via the Internet
cloud
a server not physically located at a company's site but accessed through the Internet
cloud
allows client computers to access a database
cloud
acts as a repository for application software
database
keeps track of user logins to the network and which services are available to each user
database
hosts websites that can be accessed via the Internet
database
a server not physically located at a company's site but accessed through the Internet
database
allows client computers to access a database
database
acts as a repository for application software
web
keeps track of user logins to the network and which services are available to each user
web
hosts websites that can be accessed via the Internet
web
a server not physically located at a company's site but accessed through the Internet
web
allows client computers to access a database
web
acts as a repository for application software
authentication
keeps track of user logins to the network and which services are available to each user
authentication
hosts websites that can be accessed via the Internet
authentication
a server not physically located at a company's site but accessed through the Internet
authentication
allows client computers to access a database
authentication
acts as a repository for application software
application
keeps track of user logins to the network and which services are available to each user
application
hosts websites that can be accessed via the Internet
application
a server not physically located at a company's site but accessed through the Internet
application
allows client computers to access a database
application
acts as a repository for application software
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
73
Match between columns
terminator
set of common rules that control communications among network devices
terminator
special type of data packet
terminator
device that absorbs a signal so that it is not reflected back
terminator
computer system designed to attract unauthorized users
terminator
holds multiple data packets
token
set of common rules that control communications among network devices
token
special type of data packet
token
device that absorbs a signal so that it is not reflected back
token
computer system designed to attract unauthorized users
token
holds multiple data packets
honey pot
set of common rules that control communications among network devices
honey pot
special type of data packet
honey pot
device that absorbs a signal so that it is not reflected back
honey pot
computer system designed to attract unauthorized users
honey pot
holds multiple data packets
frame
set of common rules that control communications among network devices
frame
special type of data packet
frame
device that absorbs a signal so that it is not reflected back
frame
computer system designed to attract unauthorized users
frame
holds multiple data packets
protocol
set of common rules that control communications among network devices
protocol
special type of data packet
protocol
device that absorbs a signal so that it is not reflected back
protocol
computer system designed to attract unauthorized users
protocol
holds multiple data packets
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
74
Match between columns
NIC
an operating system for network servers
NIC
adapter card that connects a computer to a network
NIC
method used on Ethernet networks to avoid data collisions
NIC
network in which each node connected to the network communicates directly with every other node
NIC
used for internal identification of nodes on a network
P2P
an operating system for network servers
P2P
adapter card that connects a computer to a network
P2P
method used on Ethernet networks to avoid data collisions
P2P
network in which each node connected to the network communicates directly with every other node
P2P
used for internal identification of nodes on a network
CSMA/CD
an operating system for network servers
CSMA/CD
adapter card that connects a computer to a network
CSMA/CD
method used on Ethernet networks to avoid data collisions
CSMA/CD
network in which each node connected to the network communicates directly with every other node
CSMA/CD
used for internal identification of nodes on a network
MAC address
an operating system for network servers
MAC address
adapter card that connects a computer to a network
MAC address
method used on Ethernet networks to avoid data collisions
MAC address
network in which each node connected to the network communicates directly with every other node
MAC address
used for internal identification of nodes on a network
NOS
an operating system for network servers
NOS
adapter card that connects a computer to a network
NOS
method used on Ethernet networks to avoid data collisions
NOS
network in which each node connected to the network communicates directly with every other node
NOS
used for internal identification of nodes on a network
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
75
Match between columns
PAN
network of two or more LANs
PAN
a network in a small geographic area
PAN
links users in a specific geographic area (usually a city)
PAN
used by a single individual connecting devices using wireless media
PAN
can be used for a small home-based business
LAN
network of two or more LANs
LAN
a network in a small geographic area
LAN
links users in a specific geographic area (usually a city)
LAN
used by a single individual connecting devices using wireless media
LAN
can be used for a small home-based business
WAN
network of two or more LANs
WAN
a network in a small geographic area
WAN
links users in a specific geographic area (usually a city)
WAN
used by a single individual connecting devices using wireless media
WAN
can be used for a small home-based business
MAN
network of two or more LANs
MAN
a network in a small geographic area
MAN
links users in a specific geographic area (usually a city)
MAN
used by a single individual connecting devices using wireless media
MAN
can be used for a small home-based business
HAN
network of two or more LANs
HAN
a network in a small geographic area
HAN
links users in a specific geographic area (usually a city)
HAN
used by a single individual connecting devices using wireless media
HAN
can be used for a small home-based business
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
76
Match between columns
switch
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
switch
software or hardware that prevents unauthorized entry to a network
switch
device that sends information between two networks
switch
sends data between different collision domains on a single network
switch
data broken into a small segment with an address to which it is sent
router
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
router
software or hardware that prevents unauthorized entry to a network
router
device that sends information between two networks
router
sends data between different collision domains on a single network
router
data broken into a small segment with an address to which it is sent
firewall
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
firewall
software or hardware that prevents unauthorized entry to a network
firewall
device that sends information between two networks
firewall
sends data between different collision domains on a single network
firewall
data broken into a small segment with an address to which it is sent
packet
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
packet
software or hardware that prevents unauthorized entry to a network
packet
device that sends information between two networks
packet
sends data between different collision domains on a single network
packet
data broken into a small segment with an address to which it is sent
bridge
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
bridge
software or hardware that prevents unauthorized entry to a network
bridge
device that sends information between two networks
bridge
sends data between different collision domains on a single network
bridge
data broken into a small segment with an address to which it is sent
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 76 flashcards in this deck.