Deck 12: Behind the Scenes: Networking and Security in the Business World
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Match between columns
Question
Match between columns
Question
Match between columns
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/76
Play
Full screen (f)
Deck 12: Behind the Scenes: Networking and Security in the Business World
1
The ends of the cable in a bus network use a(n)________ to absorb signals so that they are not reflected back to network components that have already received the signals.
A) endcap
B) terminator
C) stopper
D) block
A) endcap
B) terminator
C) stopper
D) block
B
2
Which of the following is the most commonly used client/server network topology?
A) Star
B) Cluster
C) Ring
D) Hierarchical
A) Star
B) Cluster
C) Ring
D) Hierarchical
A
3
Ring networks use the ________ method to avoid data collisions.
A) packet screening
B) active-check
C) token
D) passive-check
A) packet screening
B) active-check
C) token
D) passive-check
C
4
A ________ is a group of two or more computers, or nodes, designed to share information and resources.
A) router
B) bus
C) bridge
D) network
A) router
B) bus
C) bridge
D) network
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
5
________ cable is NOT subject to electromagnetic interference or radio frequency interference.
A) Twisted-pair
B) Fiber-optic
C) Polycarbonate
D) Coaxial
A) Twisted-pair
B) Fiber-optic
C) Polycarbonate
D) Coaxial
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
6
In a ________ network, each node connected to the network communicates directly with every other node.
A) client/server
B) peer-to-peer
C) router
D) bridge
A) client/server
B) peer-to-peer
C) router
D) bridge
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is NOT a common network topology?
A) Star
B) Cluster
C) Linear bus
D) Ring
A) Star
B) Cluster
C) Linear bus
D) Ring
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is NOT a factor to consider when selecting network cabling?
A) Cable diameter
B) Interference
C) Maximum run length
D) Bandwidth
A) Cable diameter
B) Interference
C) Maximum run length
D) Bandwidth
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
9
A ________ network can contain servers as well as individual computers.
A) client/server
B) peer-to-peer
C) switch
D) distributed
A) client/server
B) peer-to-peer
C) switch
D) distributed
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
10
In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.
A) Star
B) Bus
C) Hierarchical
D) Cluster
A) Star
B) Bus
C) Hierarchical
D) Cluster
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
11
A ________ topology uses more than one topology when building a network.
A) hybrid
B) multiple-use
C) fusion
D) crossover
A) hybrid
B) multiple-use
C) fusion
D) crossover
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
12
The computers in a lab on a floor of a building would be connected using a ________.
A) WAN
B) LAN
C) MAN
D) PAN
A) WAN
B) LAN
C) MAN
D) PAN
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
13
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
A) hit
B) crash
C) stop
D) jam
A) hit
B) crash
C) stop
D) jam
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
14
________ is the amount of data that can be transmitted across a transmission medium in a certain amount of time.
A) Data capacity
B) Scalability
C) Bandwidth
D) Infusion
A) Data capacity
B) Scalability
C) Bandwidth
D) Infusion
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
15
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
A) stack
B) spooler
C) logger
D) heap
A) stack
B) spooler
C) logger
D) heap
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
16
A ________ is a set of rules for how information and communication are exchanged.
A) protocol
B) token
C) frame
D) packet
A) protocol
B) token
C) frame
D) packet
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
17
A(n)________ server tracks who is logging on to the network as well as which services on the network are available to each user.
A) application
B) authentication
C) dedicated
D) file
A) application
B) authentication
C) dedicated
D) file
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
18
A(n)________ server is a server that stores and manages files for network users.
A) file
B) e-mail
C) print
D) database
A) file
B) e-mail
C) print
D) database
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
19
For business networks, which of the following is NOT a main cable type?
A) Twisted-pair
B) Duplex
C) Coaxial
D) Fiber-optic
A) Twisted-pair
B) Duplex
C) Coaxial
D) Fiber-optic
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
20
A ________ uses the Internet communications infrastructure to build a secure and private network.
A) PAN
B) WAN
C) VPN
D) HAN
A) PAN
B) WAN
C) VPN
D) HAN
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
21
________ provides the capability for troops on the ground to communicate with each other by routing signals through advanced sensor and targeting pods aboard military aircraft
A) Net-T
B) ROVER-5
C) IP7
D) DOU-Z
A) Net-T
B) ROVER-5
C) IP7
D) DOU-Z
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
22
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.
A) brute force attack
B) spammer
C) worm
D) Trojan horse
A) brute force attack
B) spammer
C) worm
D) Trojan horse
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
23
A(n)________ network is often the type of network that is set up in a home or very small business.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
24
A ________ sends data between two networks.
A) repeater
B) switch
C) hub
D) router
A) repeater
B) switch
C) hub
D) router
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
25
A(n)________ server is maintained by a hosting company and is connected to networks using the Internet.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
26
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.
A) viewing
B) sniffing
C) scanning
D) screening
A) viewing
B) sniffing
C) scanning
D) screening
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
27
A(n)________ is made up of two or more LANs that are miles apart.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
28
Most home networks use ________ cable, which is most susceptible to interference.
A) fiber-optic
B) unshielded twisted-pair
C) wi-fi
D) coaxial
A) fiber-optic
B) unshielded twisted-pair
C) wi-fi
D) coaxial
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
29
The physical address assigned each network adapter is called its ________.
A) network access control (NAC)
B) physical address control (PAC)
C) network physical address (NPA)
D) media access control (MAC)
A) network access control (NAC)
B) physical address control (PAC)
C) network physical address (NPA)
D) media access control (MAC)
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
30
A(n)________ address is the address that external entities use when communicating with your network.
A) ALU
B) MAC
C) WAP
D) IP
A) ALU
B) MAC
C) WAP
D) IP
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
31
A library book reservation service is a good example of a use for a(n)________ server.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
32
A(n)________ server is a server used to fulfill one specific purpose.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
33
________ technology places data packets inside other data packets.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
34
________ means that additional users can easily be added without affecting the performance of the other network nodes.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
35
A(n)________ server is a heavily secured server located between a company's secure internal network and its firewall.
A) transitional
B) armored
C) bastion host
D) proxy
A) transitional
B) armored
C) bastion host
D) proxy
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
36
A ________ sends data from one collision domain to another.
A) switch
B) bridge
C) link
D) router
A) switch
B) bridge
C) link
D) router
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
37
A ________ keeps your computer safe by determining who is trying to access it.
A) gateway
B) firewall
C) hub
D) switch
A) gateway
B) firewall
C) hub
D) switch
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
38
A(n)________ is used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
39
A(n)________ is an area of an intranet to which only certain corporations or individuals can access.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
40
________ is the standard communications protocol used on most client/server networks.
A) Ethernet
B) NOS
C) TCP/IP
D) VPN
A) Ethernet
B) NOS
C) TCP/IP
D) VPN
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
41
Retinal scanning is an example of ________ authentication.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
42
A(n)________ can often be equipped to act as a hardware firewall.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
43
Identification badges and smart keys are examples of ________ objects that users carry to identify themselves and that allow them access to a computer system or computer facility.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
44
A(n)________ is a device that reads information from a magnetic strip on the back of a credit card-like identification card.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
45
In a client/server network, each network node communicates directly with every other node on the network.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
46
Data flows in both directions in a ring network.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
47
________ is the process that requires users to prove that they have permission to access a computer network.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
48
Because of its centralized design, a(n)________ topology is the simplest to troubleshoot and repair.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
49
NIC stands for ________.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
50
An international company like Microsoft would use a MAN to connect all of its computers.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
51
________ interference is a type of network interference for cable transmission media that can be caused by nearby television or radio signals.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
52
P2P networks become difficult to manage when they exceed five users.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
53
A ring topology is also known as a(n)________ topology.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
54
A(n)________ server acts as a liaison between an internal network and an external network.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
55
A(n)________ is a group of data packets that are sent together.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
56
A(n)________ provides wireless devices with a sending and receiving connection point to the network.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
57
A(n)________ server is used to host an Internet site.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
58
Fluorescent lights and machinery with motors or transformers are common sources of ________ emissions.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
59
________ cable is the most costly to install.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
60
A(n)________ cable contains a glass or plastic core.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
61
Transmission media comprise the physical system that data take to flow between devices on the network.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
62
Since data transmissions can pass through fiber-optic cable in only one direction, at least two fibers are required to enable transmission of data in both directions.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
63
A phishing attack is an attempt to access an account by repeatedly trying different passwords.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
64
Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
65
MAC addresses are restricted to Macintosh computers.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
66
MAC addresses and IP addresses are the same thing.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
67
A bridge sends information between two networks.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
68
Worms often try to disguise from where they are sending data by using a bogus IP addresses instead of using an authorized IP address belonging to the network.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
69
Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
70
A facial-recognition scanner is an example of a biometric authentication device.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
71
In an active topology, each node helps to move data through a network.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
72
Match between columns
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
73
Match between columns
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
74
Match between columns
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
75
Match between columns
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
76
Match between columns
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck