Multiple Choice Identify the choice that
best completes the statement or answers the question.
|
|
1.
|
What is another name for the physical address assigned to each network
adapter?
a. | NPA: network physical
address | c. | MAC: media access
control | b. | NAC: network access control | d. | NAC: network access control |
|
|
2.
|
Peer-to-peer networks are independent of other
computers on the network; in other words, they
are:
a. | co-existing. | c. | loners | b. | centralized | d. | decentralized |
|
|
3.
|
Which topology is the most commonly used client/server network
topology?
|
|
4.
|
The star topology uses a __________ to connect all of the
nodes.
a. | button | c. | switch | b. | toggle | d. | paddle |
|
|
5.
|
The traditional home telephone cable uses which type of wired transmission
cable?
a. | Fiber
-optic | c. | Wireless | b. | Coaxial | d. | Twisted pair |
|
|
6.
|
A __________ topology is created when more than one network topology is
used.
a. | fusion | c. | hybrid | b. | multi-use | d. | crossover |
|
|
7.
|
A __________ server manages the print jobs on all computers on a
network.
a. | computer | c. | management | b. | print | d. | document |
|
|
8.
|
__________ is the term used to describe software that runs maliciously on your
computer, often without your knowledge.
a. | Malicioware | c. | Virusware | b. | Badware | d. | Malware |
|
|
9.
|
Which is NOT a category of security threats?
a. | Human errors and
mistakes | c. | Malicious human
activity | b. | Software errors | d. | Natural events and disasters |
|
|
10.
|
A __________ allows multiple users to connect to the Internet through one
connection.
a. | coaxial
cable | c. | hub | b. | network | d. | computer |
|
|
11.
|
A __________ is a network with the computers in close geographical
range.
a. | MAN (metropolitan area
network) | c. | SAN (storage area
network) | b. | WAN (wide area network) | d. | LAN (local area network) |
|
|
12.
|
Packet __________ is a form of protection for your computer that looks at each
packet that comes into your computer network.
a. | screening | c. | viewing | b. | observing | d. | browsing |
|
|
13.
|
A __________ is a set of rules that define how information is exchanged on a
network.
a. | dictionary | c. | procedure | b. | definition | d. | protocol |
|
|
14.
|
Which is NOT an advantage of using a network with the star
topology?
a. | Troubleshooting is easier because of
the use of a switch that centralizes the network | c. | A large number of users does not affect the performance of the
network. | b. | If one computer stops working, the others on the network are not
affected | d. | There is a minimal amount of cabling
required |
|
|
15.
|
Which of the following is NOT a network topology?
a. | Star | c. | Ring | b. | String | d. | Bus |
|
|
16.
|
A __________ is made up of two or more __________ connected by transmission
media.
a. | LAN,
WANs | c. | WAN,
MANs | b. | LAN, MANs | d. | WAN, LANs |
|
|
17.
|
A ___________ server acts as a liaison between an intranet and the
Internet.
a. | between | c. | pretend | b. | proxy | d. | surrogate |
|
|
18.
|
Which of the following is NOT an advantage of using networks compared to a
stand-alone computer?
a. | Increased communication
capabilities | c. | Ease of
maintenance and administration | b. | Enhanced resource sharing | d. | Increased productivity |
|
|
19.
|
Which of the following is used to send data between two
networks?
a. | Repeaters | c. | Switches | b. | Hubs | d. | Routers |
|
|
20.
|
Which topology is used, most often, as a peer-to-peer
network?
|
|
21.
|
A __________ keeps your computer safe by confirming who is trying to access
it.
a. | safe | c. | gate | b. | lock | d. | firewall |
|
|
22.
|
Which is something a network adapter does NOT do?
a. | Allows or denies access to the
computer in which it is installed | c. | Uses high-powered signals so data can move, easily, over network transmission
media | b. | Verifies that all information leaving the computer is
accurate | d. | Breaks down data and puts it into
packets |
|
|
23.
|
When data is sent over a network by two computers at the same time, a
__________ can occur.
a. | data
clash | c. | data
interruption | b. | data collision | d. | data crash |
|
|
24.
|
Which cable type has the highest cable cost?
a. | ThinNet
coaxial | c. | Fiber
optic | b. | Twisted pair | d. | ThickNet coaxial |
|
|
25.
|
In a network that uses the star topology, the signal that is sent to indicate
a signal collision is called a __________ signal.
|
|
26.
|
A __________ is used to control the flow of data from each of the nodes on a
network using the star topology.
a. | packet | c. | toggle | b. | paddle | d. | switch |
|
|
27.
|
__________ are often equipped to act as hardware
firewalls.
a. | Repeaters | c. | Routers | b. | Packets | d. | Tokens |
|
|
28.
|
Which of the following is something you would NOT consider when choosing a
cable type?
a. | Cable
radius | c. | Cable
cost | b. | Bend radius | d. | Bandwidth |
|
|
29.
|
__________ networks do not require a server.
a. | Peer-to-peer | c. | Intranet | b. | Client/server | d. | Extranet |
|
|
30.
|
A(n) __________ is used when passing data along a network using a ring
topology.
a. | token | c. | trinket | b. | envelope | d. | ringlet |
|