Exam 12: Behind the Scenes: Networking and Security in the Business World

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ends of the cable in a bus network use a(n)________ to absorb signals so that they are not reflected back to network components that have already received the signals.

(Multiple Choice)
4.8/5
(27)

A(n)________ is a device that reads information from a magnetic strip on the back of a credit card-like identification card.

(Short Answer)
4.8/5
(35)

A(n)________ server is used to host an Internet site.

(Short Answer)
4.9/5
(30)

A print server uses a print ________ as a software holding area for jobs waiting to be printed.

(Multiple Choice)
4.9/5
(32)

In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.

(Multiple Choice)
4.8/5
(37)

A(n)________ can often be equipped to act as a hardware firewall.

(Short Answer)
4.7/5
(37)

Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.

(Multiple Choice)
4.9/5
(32)

A phishing attack is an attempt to access an account by repeatedly trying different passwords.

(True/False)
4.9/5
(35)

NIC stands for ________.

(Short Answer)
4.9/5
(29)

Data flows in both directions in a ring network.

(True/False)
4.9/5
(39)

Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.

(True/False)
4.8/5
(31)

________ is the process that requires users to prove that they have permission to access a computer network.

(Short Answer)
4.7/5
(40)

________ interference is a type of network interference for cable transmission media that can be caused by nearby television or radio signals.

(Short Answer)
5.0/5
(40)

________ is the amount of data that can be transmitted across a transmission medium in a certain amount of time.

(Multiple Choice)
4.8/5
(38)

In a client/server network, each network node communicates directly with every other node on the network.

(True/False)
4.8/5
(40)

A(n)________ cable contains a glass or plastic core.

(Short Answer)
4.8/5
(36)

Worms often try to disguise from where they are sending data by using a bogus IP addresses instead of using an authorized IP address belonging to the network.

(True/False)
4.7/5
(42)

In an active topology, each node helps to move data through a network.

(True/False)
4.8/5
(31)

Retinal scanning is an example of ________ authentication.

(Short Answer)
4.8/5
(39)

An international company like Microsoft would use a MAN to connect all of its computers.

(True/False)
4.9/5
(41)
Showing 41 - 60 of 76
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)