Term
________ is a group of computers, that exchange data, usually confined to a small geographic area. |
|
Definition
|
|
Term
________ is the device that enables the sending and receiving of data to and from a computer. |
|
Definition
Network Adapter aka. Network Interface Card (NIC) |
|
|
Term
________ means the network card can send and receive data simultaneously |
|
Definition
Full-Duplex
Half-Duplex means data can be sent and received, but not at same time. |
|
|
Term
__________ is a set of rules that govern the transmission of data between network adapters and various central connecting devices. All network adapters and central connecting devices must be compatible in order to communicate with each other. |
|
Definition
|
|
Term
__________ is when information is sent to one host only. This reduces network traffic greatly, and helps with packet loss and duplicates |
|
Definition
|
|
Term
what is the loopback address for a computer? What commands are used to ping? |
|
Definition
127.0.0.1
ping localhost ping loopback ping 127.0.0.1 |
|
|
Term
________ acts as the central connecting device for the wireless network and allows laptops, PDAs and handheld computers to communicate with each other. |
|
Definition
Wireless Access Point (WAP) |
|
|
Term
__________ is a group of hosts with a common set of requirements that communicate as if they were connected together in a normal fashion on one switch, regardless of their physical location |
|
Definition
|
|
Term
__________ is a small network that is set up separately from a company’s private local area network and the Internet. It is called this because it is usually on the edge of the LAN |
|
Definition
Perimeter Network aka Demilitarized Zone (DMZ)
DMZ has become the more popular way to reference it. |
|
|
Term
The configuration for a DMZ that has it situated between two firewall devices. |
|
Definition
Back-to-back configuration |
|
|
Term
When the DMZ is attached to a separate connection of the company firewall. So, the firewall would have three connections: one to the company LAN, one to the DMZ, and one to the internet. |
|
Definition
3-leg perimeter configuration |
|
|
Term
__________ define the physical connections of hosts in a computer network. |
|
Definition
Network Topologies
Star, ring and mesh are some examples |
|
|
Term
When a __________ topology is used, each computer is individually wired to a central connecting device with twisted-pair cabling. |
|
Definition
|
|
Term
In a ________ topology, every computer connects to every other computer; no central connecting device is needed. |
|
Definition
Mesh Topology
Most redundant and most expensive topology |
|
|
Term
In a ________ topology, each computer is connected to two other computers in a circular path. |
|
Definition
|
|
Term
The _________ network architecture sends data logically in a ring fashion, however the computers are physically connected in a star fashion. |
|
Definition
|
|
Term
_________ topology describes how the data is actually sent from one computer to the next. |
|
Definition
|
|
Term
Which of the following standards describe CSMA/CD?
Select one: A. 801.2 B. 802.3 C. 802.5 D. 802.11 |
|
Definition
|
|
Term
Which model uses a central database for authentication?
Select one: A. peer-to-peer B. workgroup C. client/server D. distributive |
|
Definition
|
|
Term
Active Directory runs on which of the following types of servers?
Select one: A. file server B. print server C. database server Incorrect D. network controller |
|
Definition
|
|