Exam 12: Behind the Scenes: Networking and Security in the Business World

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) ________ address is the address that external entities use when communicating with your network.

Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
Verified

D

The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.

Free
(Multiple Choice)
4.9/5
(44)
Correct Answer:
Verified

B

Match each of the following terms to its definition:
switch
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
router
data broken into a small segment with an address to which it is sent
firewall
software or hardware that prevents unauthorized entry to a network
Correct Answer:
Verified
Premises:
Responses:
switch
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
router
data broken into a small segment with an address to which it is sent
firewall
software or hardware that prevents unauthorized entry to a network
packet
sends data between different collision domains on a single network
bridge
device that sends information between two networks
Free
(Matching)
4.9/5
(34)
Correct Answer:
Verified

Worms often try to disguise their origins by using a bogus IP address instead of using an authorized IP address belonging to the network.

(True/False)
4.8/5
(34)

Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.

(Multiple Choice)
4.7/5
(39)

A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.

(Multiple Choice)
4.9/5
(34)

MAC addresses and IP addresses are the same thing.

(True/False)
4.9/5
(37)

The physical address assigned to each network adapter is called its ________ address.

(Multiple Choice)
4.7/5
(36)

In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.

(Multiple Choice)
4.8/5
(24)

Since data transmissions can pass through fiber-optic cable in only one direction, at least two fibers are required to enable transmission of data in both directions.

(True/False)
4.8/5
(43)

A ________ network can contain servers as well as individual computers.

(Multiple Choice)
4.8/5
(35)

A(n) ________ is an area of an intranet to which only certain external users have access.

(Short Answer)
4.7/5
(37)
Match each of the following terms to its definition:
terminator
device that absorbs a signal so that it is not reflected back
token
computer system designed to attract unauthorized users
honey pot
special type of data packet
Correct Answer:
Verified
Premises:
Responses:
terminator
device that absorbs a signal so that it is not reflected back
token
computer system designed to attract unauthorized users
honey pot
special type of data packet
frame
holds multiple data packets
protocol
set of common rules that control communications among network devices
(Matching)
4.7/5
(33)

P2P networks become difficult to administer when they have large numbers of users.

(True/False)
4.7/5
(33)
Match each of the following dedicated servers to its function:
cloud
keeps track of user logins to the network and which services are available to each user
database
hosts websites that can be accessed via the Internet
web
allows client computers to access a database
Correct Answer:
Verified
Premises:
Responses:
cloud
keeps track of user logins to the network and which services are available to each user
database
hosts websites that can be accessed via the Internet
web
allows client computers to access a database
authentication
a server not physically located at a company's site but accessed through the Internet
application
acts as a repository for application software
(Matching)
4.8/5
(26)

In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.

(Multiple Choice)
4.8/5
(36)

________ cable is NOT subject to electromagnetic interference or radio frequency interference.

(Multiple Choice)
4.9/5
(26)

A ________ keeps your computer safe by determining who is trying to access it.

(Multiple Choice)
4.8/5
(33)

Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.

(True/False)
4.8/5
(32)

A(n) ________ is made up of two or more LANs that are miles apart.

(Essay)
4.8/5
(31)
Showing 1 - 20 of 76
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)