Exam 24: Network Fundamentals

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What are some of the changes that have occurred in our society because of the Internet? What are some disadvantages of being so dependent on the Internet?

(Essay)
4.8/5
(41)

A(n) ____ acts like a switchboard through a firewall.

(Multiple Choice)
4.7/5
(30)

Which of the following network benefit do companies take advantage of when they purchase a site license?

(Multiple Choice)
4.8/5
(30)

"Sniffer" software is used to ____.

(Multiple Choice)
4.8/5
(35)

Client/server networks are easier to set up and manage than peer-to-peer networks.

(True/False)
4.9/5
(34)

Which of the following is true about e-mail?

(Multiple Choice)
4.9/5
(41)

Networks are divided into four main types.

(True/False)
4.9/5
(37)

Companies handling sensitive information should back up data regularly and store it ____.

(Multiple Choice)
4.8/5
(37)

A cache is a(n) ____.

(Multiple Choice)
4.9/5
(36)
Identify the letter of the choice that best matches the phrase or definition.
Small, simple, inexpensive device that joins multiple computers together
Modem
Connects two or more LANs to make a WAN
Communication channel
Enables a computer to transmit voice data over telephone lines
Node
Correct Answer:
Verified
Premises:
Responses:
Small, simple, inexpensive device that joins multiple computers together
Modem
Connects two or more LANs to make a WAN
Communication channel
Enables a computer to transmit voice data over telephone lines
Node
Each device on the network
Router
Can include telephone lines, fiber optics, satellites, microwaves or any combination of these
Hub
(Matching)
4.9/5
(35)

In a client/server network, all computers are equal.

(True/False)
4.9/5
(33)

In a client/server network, which of the following would be considered the client?

(Multiple Choice)
4.9/5
(38)

A network is simply a group of two or more computers linked together.

(True/False)
4.8/5
(42)

The communication area of a LAN might be as large as a state, country, or even the world.

(True/False)
4.9/5
(34)

Server operating systems are high-end programs designed to provide network control and include special functions for connecting computers and other devices into a network.

(True/False)
4.9/5
(31)

____________________ consist of special hardware and software to protect individual companies' networks from external networks.

(Short Answer)
4.9/5
(35)

Case 24-2 Bryah owns a small business and travels frequently. She is concerned about the security of the data on her laptop, which includes valuable information and trade secrets. When Bryah is traveling, accidental association would be a concern when she is ____.

(Multiple Choice)
4.9/5
(24)

____________________ are people who break into computer systems to steal services and information.

(Short Answer)
4.8/5
(30)

An extranet is similar to a(n) server but it allows specific users outside of the organization to access internal information systems.

(True/False)
4.8/5
(33)

FIGURE 24-1 FIGURE 24-1   Figure 24-1 above shows an example of ____. Figure 24-1 above shows an example of ____.

(Multiple Choice)
4.8/5
(40)
Showing 21 - 40 of 46
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)