Name:     ID: 
 
Email: 

CIS 101 TECH CH-12

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

What is another name for the physical address assigned to each network adapter?
a.
NPA: network physical address
c.
MAC: media access control
b.
NAC: network access control
d.
NAC: network access control
 

 2. 

Peer-to-peer networks are independent of other computers      on the network; in other words, they are:
a.
co-existing.
c.
loners
b.
centralized
d.
decentralized
 

 3. 

Which topology is the most commonly used client/server network topology?
a.
Ring
c.
Bus
b.
Mesh
d.
Star
 

 4. 

The star topology uses a __________ to connect all of the nodes.
a.
button
c.
switch
b.
toggle
d.
paddle
 

 5. 

The traditional home telephone cable uses which type of wired transmission cable?
a.
Fiber -optic
c.
Wireless
b.
Coaxial
d.
Twisted pair
 

 6. 

A __________ topology is created when more than one network topology is used.
a.
fusion
c.
hybrid
b.
multi-use
d.
crossover
 

 7. 

A __________ server manages the print jobs on all computers on a network.
a.
computer
c.
management
b.
print
d.
document
 

 8. 

__________ is the term used to describe software that runs maliciously on your computer, often without your knowledge.
a.
Malicioware
c.
Virusware
b.
Badware
d.
Malware
 

 9. 

Which is NOT a category of security threats?
a.
Human errors and mistakes
c.
Malicious human activity
b.
Software errors
d.
Natural events and disasters
 

 10. 

A __________ allows multiple users to connect to the Internet through one connection.
a.
coaxial cable
c.
hub
b.
network
d.
computer
 

 11. 

A __________ is a network with the computers in close geographical range.
a.
MAN (metropolitan area network)
c.
SAN (storage area network)
b.
WAN (wide area network)
d.
LAN (local area network)
 

 12. 

Packet __________ is a form of protection for your computer that looks at each packet that comes into your computer network.
a.
screening
c.
viewing
b.
observing
d.
browsing
 

 13. 

A __________ is a set of rules that define how information is exchanged on a network.
a.
dictionary
c.
procedure
b.
definition
d.
protocol
 

 14. 

Which is NOT an advantage of using a network with the star topology?
a.
Troubleshooting is easier because of the use of a switch that centralizes the network
c.
A large number of users does not affect the performance of the network.
b.
If one computer stops working, the others on the network are not affected
d.
There is a minimal amount of cabling required
 

 15. 

Which of the following is NOT a network topology?
a.
Star
c.
Ring
b.
String
d.
Bus
 

 16. 

A __________ is made up of two or more __________ connected by transmission media.
a.
LAN, WANs
c.
WAN, MANs
b.
LAN, MANs
d.
WAN, LANs
 

 17. 

A ___________ server acts as a liaison between an intranet and the Internet.
a.
between
c.
pretend
b.
proxy
d.
surrogate
 

 18. 

Which of the following is NOT an advantage of using networks compared to a stand-alone computer?
a.
Increased communication capabilities
c.
Ease of maintenance and administration
b.
Enhanced resource sharing
d.
Increased productivity
 

 19. 

Which of the following is used to send data between two networks?
a.
Repeaters
c.
Switches
b.
Hubs
d.
Routers
 

 20. 

Which topology is used, most often, as a peer-to-peer network?
a.
Star
c.
Bus
b.
Mesh
d.
Ring
 

 21. 

A __________ keeps your computer safe by confirming who is trying to access it.
a.
safe
c.
gate
b.
lock
d.
firewall
 

 22. 

Which is something a network adapter does NOT do?
a.
Allows or denies access to the computer in which it is installed
c.
Uses high-powered signals so data can move, easily, over network transmission media
b.
Verifies that all information leaving the computer is accurate
d.
Breaks down data and puts it into packets
 

 23. 

When data is sent over a network by two computers at the same time, a __________ can occur.
a.
data clash
c.
data interruption
b.
data collision
d.
data crash
 

 24. 

Which cable type has the highest cable cost?
a.
ThinNet coaxial
c.
Fiber optic
b.
Twisted pair
d.
ThickNet coaxial
 

 25. 

In a network that uses the star topology, the signal that is sent to indicate a signal collision is called a __________ signal.
a.
jam
c.
crash
b.
hit
d.
stop
 

 26. 

A __________ is used to control the flow of data from each of the nodes on a network using the star topology.
a.
packet
c.
toggle
b.
paddle
d.
switch
 

 27. 

__________ are often equipped to act as  hardware firewalls.
a.
Repeaters
c.
Routers
b.
Packets
d.
Tokens
 

 28. 

Which of the following is something you would NOT consider when choosing a cable type?
a.
Cable radius
c.
Cable cost
b.
Bend radius
d.
Bandwidth
 

 29. 

__________ networks do not require a server.
a.
Peer-to-peer
c.
Intranet
b.
Client/server
d.
Extranet
 

 30. 

A(n) __________ is used when passing data along a network using a ring topology.
a.
token
c.
trinket
b.
envelope
d.
ringlet
 



 
         Start Over