Exam 12: Behind the Scenes: Networking and Security in the Business World

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.

(True/False)
4.9/5
(43)

The shielded cable with a solid copper core that is more resistant to interference than twisted-pair is known as ________ cable.

(Short Answer)
4.7/5
(32)

________ cable transmits data via pulses of light.

(Short Answer)
4.9/5
(35)

A library book reservation service is a good example of a use for a(n) ________ server.

(Short Answer)
4.9/5
(33)

A(n) ________ is a private network that is used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters.

(Short Answer)
4.8/5
(28)

MAC addresses and IP addresses are the same thing.

(True/False)
4.8/5
(40)

Which of the following is the most commonly used client/server network topology?

(Multiple Choice)
5.0/5
(27)

Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.

(Multiple Choice)
4.9/5
(31)

The foil sheath on a STP cable is there to help cut down on interference.

(True/False)
4.8/5
(33)
Match each of the following networks to its definition:
MAN
links users in a specific geographic area (usually a city)
LAN
can be used for a small home-based business
HAN
used by a single individual connecting devices using wireless media
Correct Answer:
Verified
Premises:
Responses:
MAN
links users in a specific geographic area (usually a city)
LAN
can be used for a small home-based business
HAN
used by a single individual connecting devices using wireless media
PAN
network of two or more LANs
WAN
a network in a small geographic area
(Matching)
4.9/5
(39)

A ________ is a group of two or more computers, or nodes, configured to share information and resources.

(Multiple Choice)
4.7/5
(33)
Match each of the following terms to its definition:
firewall
software or hardware that prevents unauthorized entry to a network
router
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
bridge
device that sends information between two networks
Correct Answer:
Verified
Premises:
Responses:
firewall
software or hardware that prevents unauthorized entry to a network
router
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
bridge
device that sends information between two networks
switch
sends data between different collision domains on a single network
packet
data broken into a small segment with an address to which it is sent
(Matching)
4.9/5
(30)

A(n) ________ network cable contains a glass or plastic core.

(Short Answer)
4.8/5
(39)

Ring networks use the ________ method to avoid data collisions.

(Multiple Choice)
4.8/5
(41)

________ technology for a VPN places data packets inside other data packets.

(Short Answer)
4.8/5
(35)

In networking terminology, NIC stands for ________.

(Short Answer)
4.8/5
(27)

A very cost effective wired media for an environment with little to no interference is ________.

(Multiple Choice)
4.9/5
(39)

Peer-to-peer networks are considered centralized networks.

(True/False)
5.0/5
(37)

A(n) ________ provides wireless devices with a sending and receiving connection point to the network.

(Short Answer)
4.8/5
(31)

MAC addresses are restricted to Macintosh computers.

(True/False)
4.9/5
(37)
Showing 61 - 80 of 127
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)