Term
| ________ is a group of computers, that exchange data, usually confined to a small geographic area. |
|
Definition
|
|
Term
| ________ is the device that enables the sending and receiving of data to and from a computer. |
|
Definition
| Network Adapter aka. Network Interface Card (NIC) |
|
|
Term
| ________ means the network card can send and receive data simultaneously |
|
Definition
Full-Duplex
Half-Duplex means data can be sent and received, but not at same time. |
|
|
Term
| __________ is a set of rules that govern the transmission of data between network adapters and various central connecting devices. All network adapters and central connecting devices must be compatible in order to communicate with each other. |
|
Definition
|
|
Term
| __________ is when information is sent to one host only. This reduces network traffic greatly, and helps with packet loss and duplicates |
|
Definition
|
|
Term
| what is the loopback address for a computer? What commands are used to ping? |
|
Definition
127.0.0.1
ping localhost ping loopback ping 127.0.0.1 |
|
|
Term
| ________ acts as the central connecting device for the wireless network and allows laptops, PDAs and handheld computers to communicate with each other. |
|
Definition
| Wireless Access Point (WAP) |
|
|
Term
| __________ is a group of hosts with a common set of requirements that communicate as if they were connected together in a normal fashion on one switch, regardless of their physical location |
|
Definition
|
|
Term
| __________ is a small network that is set up separately from a company’s private local area network and the Internet. It is called this because it is usually on the edge of the LAN |
|
Definition
Perimeter Network aka Demilitarized Zone (DMZ)
DMZ has become the more popular way to reference it. |
|
|
Term
| The configuration for a DMZ that has it situated between two firewall devices. |
|
Definition
| Back-to-back configuration |
|
|
Term
| When the DMZ is attached to a separate connection of the company firewall. So, the firewall would have three connections: one to the company LAN, one to the DMZ, and one to the internet. |
|
Definition
| 3-leg perimeter configuration |
|
|
Term
| __________ define the physical connections of hosts in a computer network. |
|
Definition
Network Topologies
Star, ring and mesh are some examples |
|
|
Term
| When a __________ topology is used, each computer is individually wired to a central connecting device with twisted-pair cabling. |
|
Definition
|
|
Term
| In a ________ topology, every computer connects to every other computer; no central connecting device is needed. |
|
Definition
Mesh Topology
Most redundant and most expensive topology |
|
|
Term
| In a ________ topology, each computer is connected to two other computers in a circular path. |
|
Definition
|
|
Term
| The _________ network architecture sends data logically in a ring fashion, however the computers are physically connected in a star fashion. |
|
Definition
|
|
Term
| _________ topology describes how the data is actually sent from one computer to the next. |
|
Definition
|
|
Term
Which of the following standards describe CSMA/CD?
Select one: A. 801.2 B. 802.3 C. 802.5 D. 802.11 |
|
Definition
|
|
Term
Which model uses a central database for authentication?
Select one: A. peer-to-peer B. workgroup C. client/server D. distributive |
|
Definition
|
|
Term
Active Directory runs on which of the following types of servers?
Select one: A. file server B. print server C. database server Incorrect D. network controller |
|
Definition
|
|