A keeps your computer safe by determining who is trying to access it

Looking for Expert Opinion?

Let us have a look at your work and suggest how to improve it!

Get a Consultant

A _______ is a group of two or more computers or nodes, designed to share information and resources

a) bus b) network c) router

d) bridge

network

A _______ network can contain servers as well as individual computers.

a) client/server b) switch c) peer-to-peer

d) distributed

client/server

In a _______ network, each node connected to the network communicates directly with every other node.

a) bridge b) peer-to-peer c) router

d) client/server

peer-to-peer

The computers in a lab on a floor of a building would be connected using a _______.

a) LAN b) WAN c) PAN

d) MAN

LAN

A _______ uses the internet communications infrastructure to build a secure and private network

a) PAN b) WAN c) HAN

d) VPN

VPN

A(n) _______ server tracks who is logging on to the network as well as which services on the network are available to each user.

a) authentication b) file c) dedicated

d) application

authentication

A(n) _______ server is a server that stores and manages files for network users.

a) print b) file c) database

d) e-mail

file

A print server uses a print _______ as a software holding area for jobs waiting to be printed.

a) heap b) spooler c) stack

d) logger

spooler

Which of the following is NOT a common network topology?

a) Cluster b) Ring c) Linear bus

d) Star

Cluster

A _______ is a set of rules for how information and communication are exchanged.

a) frame b) protocol c) packet

d) token

protocol

Ring networks use the _______ method to avoid data collisions.

a) active-check b) packet screening c) token

d) passive-check

token

The ends of the cable in a bus network us a(n) _______ to absorb signals so that they are not reflected back to network components that have already received the signals

a) terminator b) stopper c) endcap

d) block

terminator

In a _______ network, data collisions can occur fairly easily because the network is essentially composed of a single cable

a) Star b) Bus c) Hierarchical

d) Cluster

Bus

Which of the following is the most commonly used client/server network topology?

a) Ring b) Cluster c) Star

d) Hierarchical

Star

In an Ethernet network, the signal that is sent to indicate a signal collision is called a _______ signal.

a) stop b) hit c) crash

d) jam

jam

A _______ topology uses more than one topology when building a network.

a) hybrid b) fusion c) crossover

d) multiple-use

hybrid

_______ is the amount of data that can be transmitted across a transmission medium in a certain amount of time.

a) Scalability b) Bandwidth c) Infusion

d) Data capacity

Bandwidth

Which of the following is NOT a factor to consider when selecting network cabling?

a) Cable diameter b) Bandwidth c) Maximum run length

d) Interference

Cable diameter

_______ cable is NOT subject to electromagnetic interference or radio frequency interference.

a) Fibre-optic b) Polycarbonate c) Twisted-pair

d) Coaxial

Fibre-optic

For business networks, which of the following is NOT a main cable type?

a) Fibre-optic b) Duplex c) Twisted-pair

d) Coaxial

Duplex

Most home networks use _______ cable, which is most susceptible to interference.

a) coaxial b) fiber-optic c) wi-fi

d) unshielded twisted-pair

unshielded twisted-pair

_______ is the standard communications protocol used on most client/server networks.

a) TCP/IP b) Ethernet c) VPN

d) NOS

Ethernet

The physical address assigned to each network adapter is called its _______.

a) network access control (NAC) b) physical address control (PAC) c) media access control (MAC)

d) network physical address (NPA)

media access control (MAC)

A(n) _______ address is the address that external entities use when communicating with your network

a) IP b) WAP c) ALU

d) MAC

IP

A _______ sends data from one collision domain to another.

a) link b) switch c) bridge

d) router

bridge

A _______ sends data between two networks

a) router b) switch c) repeater

d) hub

router

A _______ keeps your computer safe by determining who is trying to access it.

a) switch b) hub c) firewall

d) gateway

firewall

Packet _______ is a form of protection from your computer that looks at each packet that comes into your computer network.

a) scanning b) sniffing c) viewing

d) screening

screening

A(n) _______ server is a heavily secured server located between a company’s secure internal network and it firewall.

a) transitional b) proxy c) armoured

d) bastion host

bastion host

Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a _______.

a) worm b) spammer c) Trojan horse

d) brute force attack

brute force attack

P2P networks become difficult to manage when they exceed five users.

True or False?

False

In a client/server network, each network node communicates directly with every other node on the network.

True or False?

False

An international company like Microsoft would use a MAN to connect all of its computers.

True or False?

False (Microsoft is a strong independent woman who don’t need no MAN)

Data flows in both directions in a ring network.

True or False?

False

In an active topology, each node helps move data through a network.

True or False?

True

Transmission media comprise the physical system that data take to flow between devices on the network.

True or False?

True

Since data transmissions can pass through fibre-optic cable in only one direction, at least two fibres are required to enable transmission of data in both directions.

True or False?

True

Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.

True or False?

True

Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.

True or False?

True

MAC addresses are restricted to Macintosh computers.

True or False?

False

MAC addresses and IP addresses are the same thing.

True or False?

False

A bridge sends information between two networks.

True or False?

False

A phishing attack is an attempt to access an account by repeatedly trying different passwords.

True or False?

False

Worms often try to disguise from where they are sending data by using bogus IP addresses instead of using an authorized IP address belonging to the network.

True or False?

False

A facial-recognition scanner is an example of a biometric authentication device.

True or False?

True

Transcript

Technology In Action, Complete, 11e (Evans et al.) Chapter 12 Behind the Scenes: Networking and Security in the Business World 1) A ________ is a group of two or more computers, or nodes, designed to share information and resources. A) router B) bus C) bridge D) network Answer: D Diff: 1 Section Ref: Client/Server Network Basics 2) A ________ network can contain servers as well as individual computers. A) client/server B) peer-to-peer C) switch D) distributed Answer: A Diff: 1 Section Ref: Comparing Client/Server and Peer-to-Peer Networks 3) In a ________ network, each node connected to the network communicates directly with every other node. A) client/server B) peer-to-peer C) router D) bridge Answer: B Diff: 1 Section Ref: Comparing Client/Server and Peer-to-Peer Networks 4) The computers in a lab on a floor of a building would be connected using a ________. A) WAN B) LAN C) MAN D) PAN Answer: B Diff: 2 Section Ref: Types of Client/Server Networks 1 Copyright © 2015 Pearson Education, Inc. 5) A ________ uses the Internet communications infrastructure to build a secure and private network. A) PAN B) WAN C) VPN D) HAN Answer: C Diff: 2 Section Ref: Types of Client/Server Networks 6) A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user. A) application B) authentication C) dedicated D) file Answer: B Diff: 2 Section Ref: Authentication and File Servers 7) A(n) ________ server is a server that stores and manages files for network users. A) file B) e-mail C) print D) database Answer: A Diff: 1 Section Ref: Authentication and File Servers 8) A print server uses a print ________ as a software holding area for jobs waiting to be printed. A) stack B) spooler C) logger D) heap Answer: B Diff: 3 Section Ref: Print Servers 9) Which of the following is NOT a common network topology? A) Star B) Cluster C) Linear bus D) Ring Answer: B Diff: 3 Section Ref: Network Topologies 2 Copyright © 2015 Pearson Education, Inc. 10) A ________ is a set of rules for how information and communication are exchanged. A) protocol B) token C) frame D) packet Answer: A Diff: 2 Section Ref: Network Topologies 11) Ring networks use the ________ method to avoid data collisions. A) packet screening B) active-check C) token D) passive-check Answer: C Diff: 2 Section Ref: Ring Topology 12) The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals. A) endcap B) terminator C) stopper D) block Answer: B Diff: 3 Section Ref: Bus Topology 13) In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable. A) Star B) Bus C) Hierarchical D) Cluster Answer: B Diff: 3 Section Ref: Bus Topology 14) Which of the following is the most commonly used client/server network topology? A) Star B) Cluster C) Ring D) Hierarchical Answer: A Diff: 2 Section Ref: Star Topology 3 Copyright © 2015 Pearson Education, Inc. 15) In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal. A) hit B) crash C) stop D) jam Answer: D Diff: 3 Section Ref: Star Topology 16) A ________ topology uses more than one topology when building a network. A) hybrid B) multiple-use C) fusion D) crossover Answer: A Diff: 2 Section Ref: Comparing Topologies 17) ________ is the amount of data that can be transmitted across a transmission medium in a certain amount of time. A) Data capacity B) Scalability C) Bandwidth D) Infusion Answer: C Diff: 3 Section Ref: Transmission Media 18) Which of the following is NOT a factor to consider when selecting network cabling? A) Cable diameter B) Interference C) Maximum run length D) Bandwidth Answer: A Diff: 3 Section Ref: Wired Transmission Media 19) ________ cable is NOT subject to electromagnetic interference or radio frequency interference. A) Twisted-pair B) Fiber-optic C) Polycarbonate D) Coaxial Answer: B Diff: 2 Section Ref: Wired Transmission Media 4 Copyright © 2015 Pearson Education, Inc. 20) For business networks, which of the following is NOT a main cable type? A) Twisted-pair B) Duplex C) Coaxial D) Fiber-optic Answer: B Diff: 3 Section Ref: Wired Transmission Media 21) Most home networks use ________ cable, which is most susceptible to interference. A) fiber-optic B) unshielded twisted-pair C) wi-fi D) coaxial Answer: B Diff: 2 Section Ref: Twisted-Pair Cable 22) ________ is the standard communications protocol used on most client/server networks. A) Ethernet B) NOS C) TCP/IP D) VPN Answer: A Diff: 3 Section Ref: Network Adapters 23) The physical address assigned each network adapter is called its ________. A) network access control (NAC) B) physical address control (PAC) C) network physical address (NPA) D) media access control (MAC) Answer: D Diff: 2 Section Ref: MAC Addresses 24) A(n) ________ address is the address that external entities use when communicating with your network. A) ALU B) MAC C) WAP D) IP Answer: D Diff: 2 Section Ref: MAC Addresses 5 Copyright © 2015 Pearson Education, Inc. 25) A ________ sends data from one collision domain to another. A) switch B) bridge C) link D) router Answer: B Diff: 2 Section Ref: Switches and Bridges 26) A ________ sends data between two networks. A) repeater B) switch C) hub D) router Answer: D Diff: 2 Section Ref: Routers 27) A ________ keeps your computer safe by determining who is trying to access it. A) gateway B) firewall C) hub D) switch Answer: B Diff: 1 Section Ref: Firewalls 28) Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network. A) viewing B) sniffing C) scanning D) screening Answer: D Diff: 3 Section Ref: Firewalls 29) A(n) ________ server is a heavily secured server located between a company's secure internal network and its firewall. A) transitional B) armored C) bastion host D) proxy Answer: C Diff: 2 Section Ref: Firewalls 6 Copyright © 2015 Pearson Education, Inc. 30) Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________. A) brute force attack B) spammer C) worm D) Trojan horse Answer: A Diff: 3 Section Ref: Network Security for Client/Server Networks 31) A(n) ________ network is often the type of network that is set up in a home or very small business. Answer: peer-to-peer P2P Diff: 2 Section Ref: Comparing Client/Server and Peer-to-Peer Networks 32) ________ means that additional users can easily be added without affecting the performance of the other network nodes. Answer: Scalability Diff: 2 Section Ref: Comparing Client/Server and Peer-to-Peer Networks 33) A(n) ________ is made up of two or more LANs that are miles apart. Answer: WAN wide area network Diff: 2 Section Ref: Types of Client/Server Networks 34) A(n) ________ is used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters. Answer: intranet Diff: 2 Section Ref: Types of Client/Server Networks 35) ________ technology places data packets inside other data packets. Answer: Tunneling Diff: 3 Section Ref: Types of Client/Server Networks 36) A(n) ________ is an area of an intranet to which only certain corporations or individuals can access. Answer: extranet Diff: 2 Section Ref: Types of Client/Server Networks 7 Copyright © 2015 Pearson Education, Inc. 37) A(n) ________ server is maintained by a hosting company and is connected to networks using the Internet. Answer: cloud Diff: 2 Section Ref: Web Servers and Cloud Servers 38) A(n) ________ server is a server used to fulfill one specific purpose. Answer: dedicated Diff: 1 Section Ref: Servers 39) A library book reservation service is a good example of a use for a(n) ________ server. Answer: database Diff: 2 Section Ref: Application Servers 40) A(n) ________ server is used to host an Internet site. Answer: Web Diff: 1 Section Ref: Web Servers and Cloud Servers 41) A ring topology is also known as a(n) ________ topology. Answer: loop Diff: 2 Section Ref: Ring Topology 42) Because of its centralized design, a(n) ________ topology is the simplest to troubleshoot and repair. Answer: star Diff: 2 Section Ref: Star Topology 43) Fluorescent lights and machinery with motors or transformers are common sources of ________ emissions. Answer: Electromagnetic interference EMI Diff: 1 Section Ref: Wired Transmission Media 44) ________ interference is a type of network interference for cable transmission media that can be caused by nearby television or radio signals. Answer: Radio frequency RF Diff: 1 Section Ref: Wired Transmission Media 8 Copyright © 2015 Pearson Education, Inc. 45) A(n) ________ cable contains a glass or plastic core. Answer: fiber-optic fiber optic Diff: 1 Section Ref: Fiber-Optic Cable 46) ________ cable is the most costly to install. Answer: Fiber-optic Diff: 2 Section Ref: Fiber-Optic Cable 47) A(n) ________ provides wireless devices with a sending and receiving connection point to the network. Answer: wireless access point WAP Diff: 1 Section Ref: Network Adapters 48) NIC stands for ________. Answer: network interface card Diff: 2 Section Ref: Network Adapters 49) A(n) ________ is a group of data packets that are sent together. Answer: frame Diff: 3 Section Ref: MAC Addresses 50) A(n) ________ is a device that reads information from a magnetic strip on the back of a credit card-like identification card. Answer: access card reader card reader Diff: 2 Section Ref: Physical Protection Measures 51) ________ is the process that requires users to prove that they have permission to access a computer network. Answer: Authentication Diff: 2 Section Ref: Authentication 52) A(n) ________ can often be equipped to act as a hardware firewall. Answer: router Diff: 2 Section Ref: Firewalls 9 Copyright © 2015 Pearson Education, Inc. 53) A(n) ________ server acts as a liaison between an internal network and an external network. Answer: proxy Diff: 2 Section Ref: Firewalls 54) Retinal scanning is an example of ________ authentication. Answer: biometric Diff: 1 Section Ref: Physical Protection Measures 55) Identification badges and smart keys are examples of ________ objects that users carry to identify themselves and that allow them access to a computer system or computer facility. Answer: possessed Diff: 2 Section Ref: Client/Server Network Security 56) P2P networks become difficult to manage when they exceed five users. Answer: FALSE Diff: 2 Section Ref: Networking Advantages 57) In a client/server network, each network node communicates directly with every other node on the network. Answer: FALSE Diff: 2 Section Ref: Comparing Client/Server and Peer-to-Peer Networks 58) An international company like Microsoft would use a MAN to connect all of its computers. Answer: FALSE Diff: 2 Section Ref: Types of Client/Server Networks 59) Data flows in both directions in a ring network. Answer: FALSE Diff: 2 Section Ref: Ring Topology 60) In an active topology, each node helps to move data through a network. Answer: TRUE Diff: 2 Section Ref: Ring Topology 61) Transmission media comprise the physical system that data take to flow between devices on the network. Answer: TRUE Diff: 1 Section Ref: Transmission Media 10 Copyright © 2015 Pearson Education, Inc. 62) Since data transmissions can pass through fiber-optic cable in only one direction, at least two fibers are required to enable transmission of data in both directions. Answer: TRUE Diff: 2 Section Ref: Fiber-Optic Cable 63) Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it. Answer: TRUE Diff: 1 Section Ref: Twisted-Pair Cable 64) Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms. Answer: TRUE Diff: 1 Section Ref: Wireless Media Options 65) MAC addresses are restricted to Macintosh computers. Answer: FALSE Diff: 1 Section Ref: MAC Addresses 66) MAC addresses and IP addresses are the same thing. Answer: FALSE Diff: 2 Section Ref: MAC Addresses 67) A bridge sends information between two networks. Answer: FALSE Diff: 2 Section Ref: Routers 68) A phishing attack is an attempt to access an account by repeatedly trying different passwords. Answer: FALSE Diff: 2 Section Ref: Authentication 69) Worms often try to disguise from where they are sending data by using a bogus IP addresses instead of using an authorized IP address belonging to the network. Answer: FALSE Diff: 2 Section Ref: Firewalls 11 Copyright © 2015 Pearson Education, Inc. 70) A facial-recognition scanner is an example of a biometric authentication device. Answer: TRUE Diff: 1 Section Ref: Physical Protection Measures 71) Match each of the following dedicated servers to its function: I. authentication II. web III. cloud IV. database V. application A. acts as a repository for application software B. keeps track of user logins to the network and which services are available to each user C. a server not physically located at a company's site D. allows client computers to access a database E. hosts websites that can be accessed via the Internet Answer: B, E, C, D, A Diff: 1 Section Ref: Servers 72) Match each of the following terms to its definition: I. protocol II. token III. terminator IV. honey pot V. frame A. special type of data packet B. computer system designed to attract unauthorized users C. device that absorbs a signal so that it is not reflected back D. set of common rules that control communications among network devices E. holds multiple data packets Answer: D, A, C, B, E Diff: 3 Section Ref: Multiple locations in the chapter 12 Copyright © 2015 Pearson Education, Inc. 73) Match each of the following terms to its definition: I. NOS II. NIC III. CSMA/CD IV. P2P V. MAC address A. adapter card that connects a computer to a network B. used for internal identification on a network C. an operating system for network servers D. method used on Ethernet networks to avoid data collisions E. network in which each node connected to the network communicates directly with every other node Answer: C, A, D, E, B Diff: 3 Section Ref: Multiple locations in the chapter 74) Match each of the following networks to its definition: I. WAN II. LAN III. MAN IV. PAN V. HAN A. links users in a specific geographic area (usually a city) B. network of two or more LANs C. a network in a small geographic area D. can be used for a small home-based business E. used by a single individual connecting devices using wireless media Answer: B, C, A, E, D Diff: 3 Section Ref: Types of Client/Server Networks 13 Copyright © 2015 Pearson Education, Inc. 75) Match each of the following terms to its definition: I. switch II. firewall III. router IV. bridge V. packet A. data broken into a small segment with an address to which it is sent B. makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node C. software or hardware that prevents unauthorized entry D. sends data between different collision domains E. device that sends information between two networks Answer: B, C, E, D, A Diff: 3 Section Ref: Multiple locations in the chapter 14 Copyright © 2015 Pearson Education, Inc.