Exam 12: Behind the Scenes: Networking and Security in the Business World

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is NOT a factor to consider when selecting network cabling?

(Multiple Choice)
4.8/5
(27)

A(n)________ server is maintained by a hosting company and is connected to networks using the Internet.

(Short Answer)
4.7/5
(33)

A ________ sends data between two networks.

(Multiple Choice)
4.8/5
(30)

________ cable is the most costly to install.

(Short Answer)
4.7/5
(42)

Ring networks use the ________ method to avoid data collisions.

(Multiple Choice)
4.8/5
(32)

A ring topology is also known as a(n)________ topology.

(Short Answer)
4.8/5
(33)

________ means that additional users can easily be added without affecting the performance of the other network nodes.

(Short Answer)
4.8/5
(30)

A facial-recognition scanner is an example of a biometric authentication device.

(True/False)
4.8/5
(36)
Match each of the following terms to its definition:
protocol
device that absorbs a signal so that it is not reflected back
honey pot
holds multiple data packets
terminator
computer system designed to attract unauthorized users
Correct Answer:
Verified
Premises:
Responses:
protocol
device that absorbs a signal so that it is not reflected back
honey pot
holds multiple data packets
terminator
computer system designed to attract unauthorized users
token
special type of data packet
frame
set of common rules that control communications among network devices
(Matching)
4.9/5
(36)

Most home networks use ________ cable, which is most susceptible to interference.

(Multiple Choice)
4.9/5
(35)

P2P networks become difficult to manage when they exceed five users.

(True/False)
4.8/5
(34)

For business networks, which of the following is NOT a main cable type?

(Multiple Choice)
4.9/5
(41)

A(n)________ is used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters.

(Short Answer)
4.9/5
(32)

A ________ is a set of rules for how information and communication are exchanged.

(Multiple Choice)
4.9/5
(41)
Match each of the following dedicated servers to its function:
web
a server not physically located at a company's site
application
keeps track of user logins to the network and which services are available to each user
authentication
allows client computers to access a database
Correct Answer:
Verified
Premises:
Responses:
web
a server not physically located at a company's site
application
keeps track of user logins to the network and which services are available to each user
authentication
allows client computers to access a database
cloud
hosts websites that can be accessed via the Internet
database
acts as repository for application software
(Matching)
4.8/5
(34)

MAC addresses and IP addresses are the same thing.

(True/False)
4.8/5
(36)
Showing 61 - 76 of 76
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)