Exam 12: Behind the Scenes: Networking and Security in the Business World

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is the most commonly used client/server network topology?

(Multiple Choice)
4.9/5
(39)

A(n) ________ network cable contains a glass or plastic core.

(Short Answer)
4.9/5
(42)

A(n) ________ can often be equipped to act as a hardware firewall.

(Short Answer)
4.8/5
(36)

A(n) ________ server is a server that stores and manages files for network users.

(Multiple Choice)
4.9/5
(28)

A(n) ________ is a private network that is used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters.

(Short Answer)
4.7/5
(37)

MAC addresses are restricted to Macintosh computers.

(True/False)
4.8/5
(31)

An international company like Microsoft would use a MAN to connect all of its computers.

(True/False)
4.8/5
(31)

In networking terminology, NIC stands for ________.

(Short Answer)
4.7/5
(31)

A(n) ________ server is a server used to fulfill one specific purpose.

(Short Answer)
4.9/5
(35)

A(n) ________ network is often the type of network that is set up in a home or very small business.

(Short Answer)
4.9/5
(36)

A bridge sends information between two networks.

(True/False)
4.7/5
(35)

A print server uses a print ________ as a software holding area for jobs waiting to be printed.

(Multiple Choice)
4.8/5
(33)

Data flows in both directions around the ring in a ring network.

(True/False)
4.9/5
(34)

________ network cable is the most costly to install.

(Short Answer)
4.9/5
(36)

The computers in a lab on a floor of a building would be connected using a ________.

(Multiple Choice)
4.7/5
(37)

A ________ uses the Internet communications infrastructure to build a secure and private network.

(Multiple Choice)
4.9/5
(40)

Cars often have ________ connectivity.

(Multiple Choice)
4.9/5
(31)

Ring networks use the ________ method to avoid data collisions.

(Multiple Choice)
4.9/5
(41)

A ________ is a group of two or more computers, or nodes, configured to share information and resources.

(Multiple Choice)
4.7/5
(39)

Identification badges and smart keys are examples of ________ objects that users carry to identify themselves and that allow them access to a computer system or computer facility.

(Short Answer)
4.7/5
(27)
Showing 41 - 60 of 76
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)