1. Which of the following is an advantage of installing a client/server network in a business? a. decentralization of peripherals b. centralization of network security protection c. decentralization of files and data d. centralization of network adapters 2. Why are P2P networks not usually installed in businesses? a. They require dedicated servers. b. They are more scalable than client/server networks. c. Security is stronger on client/server networks. d. Client/server networks are cheaper to install. 3. To ensure only authorized users are logging onto a network, which server would a client/server network include? a. application b. Internet c. communications d. authentication 4. Which of the following is a private network set up by a business that s used exclusively by a select group of employees and suppliers? a. HAN b. MAN c. Vendor network d. Intranet 5. Network adapters send data packets based on a(n) a. IP address. b. router address. c. frame address. d. MAC address. 6. Providing adequate security on a corporate network involves all of the following issues except a. authentication. b. restricting access to servers. c. limiting network access by requiring passwords. d. proprietary software lockout. 1
7. A is a group of two or more computers, or nodes, designed to share information and resources. a. network b. router c. bridge d. bus 8. A network can contain servers as well as individual computers. a. peer-to-peer b. distributed c. client/server d. switch 9. In a network, each node connected to the network communicates directly with every other node. a. peer-to-peer b. router c. client/server d. bridge 10. The computers in a lab on a floor of a building would be connected using a. a. PAN b. WAN c. LAN d. MAN 11. A uses the Internet communications infrastructure to build a secure and private network. a. HAN b. VPN c. WAN d. PAN 2
12. A(n) server tracks who is logging on to the network as well as which services on the network are available to each user. a. authentication b. file c. dedicated d. application 13. A(n) server is a server that stores and manages files for network users. a. print b. database c. e-mail d. file 14. A print server uses a print as a software holding area for jobs waiting to be printed. a. stack b. spooler c. logger d. heap 15. Which of the following is NOT a common network topology? a. Star b. Linear bus c. Cluster d. Ring 16. A is a set of rules for how information and communication are exchanged. a. token b. protocol c. packet d. frame 17. Ring networks use the method to avoid data collisions. a. passive-check b. active-check c. packet screening d. token 3
18. The ends of the cable in a bus network use a(n) to absorb signals so that they are not reflected back to network components that have already received the signals. a. endcap b. stopper c. block d. terminator 19. In a network, data collisions can occur fairly easily because the network is essentially composed of a single cable. a. Cluster b. Hierarchical c. Bus d. Star 20. Which of the following is the most commonly used client/server network topology? a. Star b. Hierarchical c. Ring d. Cluster 21. In an Ethernet network, the signal that is sent to indicate a signal collision is called a signal. a. hit b. crash c. jam d. stop 22. A topology uses more than one topology when building a network. a. multiple-use b. hybrid c. fusion d. crossover 4
23. is the amount of data that can be transmitted across a transmission medium in a certain amount of time. a. Data capacity b. Scalability c. Bandwidth d. Infusion 24. Which of the following is NOT a factor to consider when selecting network cabling? a. Cable diameter b. Maximum run length c. Bandwidth d. Interference 25. cable is NOT subject to electromagnetic interference or radio frequency interference. a. Coaxial b. Polycarbonate c. Twisted-pair d. Fiber-optic 26. For business networks, which of the following is NOT a main cable type? a. Duplex b. Coaxial c. Fiber-optic d. Twisted-pair 27. Most home networks use cable, which is most susceptible to interference. a. unshielded twisted-pair b. wi-fi c. fiber-optic d. coaxial 5
28. A(n) server is a heavily secured server located between a company's secure internal network and its firewall. a. armored b. proxy c. bastion host d. transitional 29. Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a. a. worm b. spammer c. brute force attack d. Trojan horse 30. provides the capability for troops on the ground to communicate with each other by routing signals through advanced sensor and targeting pods aboard military aircraft. a. IP7 b. ROVER-5 c. DOU-Z d. Net-T 6