Exam 12: Behind the Scenes: Networking and Security in the Business World

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags
Match each of the following terms to its definition:
frame
computer system designed to attract unauthorized users
honey pot
special type of data packet
token
device that absorbs a signal so that it is not reflected back
Correct Answer:
Verified
Premises:
Responses:
frame
computer system designed to attract unauthorized users
honey pot
special type of data packet
token
device that absorbs a signal so that it is not reflected back
protocol
holds multiple data packets
terminator
set of common rules that control communications among network devices
(Matching)
4.9/5
(27)

Cars often have ________ connectivity.

(Multiple Choice)
4.9/5
(38)
Match each of the following dedicated servers to its function:
authentication
a server not physically located at a company's site but accessed through the Internet
application
allows client computers to access a database
database
hosts websites that can be accessed via the Internet
Correct Answer:
Verified
Premises:
Responses:
authentication
a server not physically located at a company's site but accessed through the Internet
application
allows client computers to access a database
database
hosts websites that can be accessed via the Internet
cloud
acts as a repository for application software
web
keeps track of user logins to the network and which services are available to each user
(Matching)
4.7/5
(35)

The software holding area for print jobs is called a print ________.

(Short Answer)
4.9/5
(36)

Which of the following involves using specialized software to make individual physical servers behave as though they are more than one physical device?

(Multiple Choice)
4.8/5
(44)

An international company like Microsoft would use a MAN to connect all of its computers.

(True/False)
5.0/5
(33)

A(n) ________ server is a server that stores and manages files for network users.

(Multiple Choice)
4.9/5
(29)

A ________ topology uses more than one type of topology when building a network.

(Multiple Choice)
4.8/5
(39)

Since data transmissions can pass through fiber-optic cable in only one direction, at least two fibers are required to enable transmission of data in both directions.

(True/False)
4.9/5
(44)

Bus networks use a passive topology.

(True/False)
4.9/5
(35)

In a client/server network, each network node communicates directly with every other node on the network.

(True/False)
4.8/5
(30)

Worms often try to disguise their origins by using a bogus IP address instead of using an authorized IP address belonging to the network.

(True/False)
4.8/5
(28)

Servers such as print and database are examples of ________ servers that fulfill a specific network function.

(Multiple Choice)
4.8/5
(33)

In a ________ network, each node connected to the network communicates directly with every other node.

(Multiple Choice)
4.9/5
(28)

For business networks, which of the following is not one of the main cable types?

(Multiple Choice)
4.8/5
(43)

Identification badges and smart keys are examples of ________ objects that users carry to identify themselves and that allow them access to a computer system or computer facility.

(Short Answer)
4.8/5
(31)

Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.

(True/False)
4.9/5
(35)

Installing a(n) ________ on an existing ethernet network will provide wireless connectivity.

(Multiple Choice)
4.8/5
(37)

A print ________ is a software holding area for print jobs.

(Short Answer)
5.0/5
(29)

Which type of server is designed to keep track of who is logging on to the network and which network services are available?

(Multiple Choice)
4.9/5
(36)
Showing 81 - 100 of 127
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)