Exam 12: Behind the Scenes: Networking and Security in the Business World
Exam 1: The Impact of Technology in a Changing World75 Questions
Exam 2: Looking at Computers: Understanding the Parts74 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources77 Questions
Exam 4: Application Software: Programs That Let You Work and Play75 Questions
Exam 5: System Software: the Operating System, Utility Programs, and File Management72 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System77 Questions
Exam 7: Networking: Connecting Computing Devices73 Questions
Exam 8: Managing a Digital Lifestyle: Media and Ethics75 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices76 Questions
Exam 10: Behind the Scenes: Software Programming75 Questions
Exam 11: Behind the Scenes: Databases and Information Systems75 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World76 Questions
Exam 13: Behind the Scenes: How the Internet Works74 Questions
Exam 14: the History of the Personal Computer34 Questions
Exam 15: Careers in It33 Questions
Select questions type
A(n) ________ address is the address that external entities use when communicating with your network.
Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
D
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.
Free
(Multiple Choice)
4.9/5
(44)
Correct Answer:
B
Match each of the following terms to its definition:
Correct Answer:
Premises:
Responses:
Free
(Matching)
4.9/5
(34)
Correct Answer:
Worms often try to disguise their origins by using a bogus IP address instead of using an authorized IP address belonging to the network.
(True/False)
4.8/5
(34)
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.
(Multiple Choice)
4.7/5
(39)
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.
(Multiple Choice)
4.9/5
(34)
The physical address assigned to each network adapter is called its ________ address.
(Multiple Choice)
4.7/5
(36)
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
(Multiple Choice)
4.8/5
(24)
Since data transmissions can pass through fiber-optic cable in only one direction, at least two fibers are required to enable transmission of data in both directions.
(True/False)
4.8/5
(43)
A ________ network can contain servers as well as individual computers.
(Multiple Choice)
4.8/5
(35)
A(n) ________ is an area of an intranet to which only certain external users have access.
(Short Answer)
4.7/5
(37)
Match each of the following terms to its definition:
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(33)
P2P networks become difficult to administer when they have large numbers of users.
(True/False)
4.7/5
(33)
Match each of the following dedicated servers to its function:
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(26)
In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.
(Multiple Choice)
4.8/5
(36)
________ cable is NOT subject to electromagnetic interference or radio frequency interference.
(Multiple Choice)
4.9/5
(26)
A ________ keeps your computer safe by determining who is trying to access it.
(Multiple Choice)
4.8/5
(33)
Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.
(True/False)
4.8/5
(32)
Showing 1 - 20 of 76
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)