Exam 12: Behind the Scenes: Networking and Security in the Business World

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An international company like Microsoft would use a MAN to connect all of its computers.

(True/False)
4.7/5
(45)

A ________ topology uses more than one topology when building a network.

(Multiple Choice)
4.8/5
(37)
Match each of the following networks to its definition:
MAN
can be used for a small home-based business
HAN
links users in a specific geographic area (usually a city)
PAN
network of two or more LANs
Correct Answer:
Verified
Premises:
Responses:
MAN
can be used for a small home-based business
HAN
links users in a specific geographic area (usually a city)
PAN
network of two or more LANs
LAN
a network in a small geographic area
WAN
used by a single individual connecting devices using wireless media
(Matching)
4.9/5
(33)

A(n) ________ server is a heavily secured server located between a company's secure internal network and its firewall.

(Multiple Choice)
4.8/5
(41)

A(n) ________ is made up of two or more LANs that are miles apart.

(Short Answer)
4.9/5
(38)

A(n) ________ is a group of data packets that are sent together.

(Short Answer)
4.8/5
(35)

A facial-recognition scanner is an example of a biometric authentication device.

(True/False)
4.8/5
(44)

A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.

(Multiple Choice)
4.9/5
(46)
Match each of the following terms to its definition:
MAC address
adapter card that connects a computer to a network
CSMA/CD
network in which each node connected to the network communicates directly with every other node
P2P
used for internal identification on a network
Correct Answer:
Verified
Premises:
Responses:
MAC address
adapter card that connects a computer to a network
CSMA/CD
network in which each node connected to the network communicates directly with every other node
P2P
used for internal identification on a network
NIC
method used on Ethernet networks to avoid data collisions
NOS
an operating system for network servers
(Matching)
4.8/5
(44)

Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.

(True/False)
4.8/5
(27)

________ interference is a type of network interference for cable transmission media that can be caused by nearby television or radio signals.

(Short Answer)
5.0/5
(30)

Ring networks use the ________ method to avoid data collisions.

(Multiple Choice)
4.8/5
(37)

In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.

(Multiple Choice)
4.8/5
(33)

A(n) ________ address is the address that external entities use when communicating with your network.

(Multiple Choice)
4.7/5
(31)

A(n) ________ is a device that reads information from a magnetic strip on the back of a credit card-like identification card.

(Short Answer)
4.8/5
(35)

________ is the process that requires users to prove that they have permission to access a computer network.

(Short Answer)
4.8/5
(40)

A(n) ________ is used exclusively within a corporation or organization.

(Short Answer)
4.8/5
(29)

A ________ keeps your computer safe by determining who is trying to access it.

(Multiple Choice)
4.8/5
(36)

A(n) ________ provides wireless devices with a sending and receiving connection point to the network.

(Short Answer)
4.9/5
(36)

A ________ is a set of rules for how information and communication are exchanged.

(Multiple Choice)
4.8/5
(29)
Showing 41 - 60 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)