A _______ is a group of two or more computers, or nodes, designed to share information and resources
A ________ network can contain servers as well as individual computers
In a ________ network, each node connected to the network communicates directly with every other node
The computers in a lab on a floor of a building would be connected using a _________
A _______ uses the Internet communications infrastructure to build a secure and private network
A(n) _______ server racks who is logging on to the network as well as which services on the network are available to each user
A(n) _______ server is a server that stores and manages files for network users
A print server uses a print _______ as a software holding area for jobs waiting to be printed
Which of the following is NOT a common network topology?
A ________ is a set of rules for how information and communication are exchanged
Ring networks use the _________ method to avoid data collisions
The ends of the cable in a bus network use a(n) _______ to absorb signals so that they are not reflected back to network components that have already received the signals
In a ______ network, data collisions can occur fairly easily because the network is essentially composed of a single cable
Which of the following is the most commonly used client/server network topology?
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal
A _________ topology uses more than one topology when building a network
_________ is the amount of data that can be transmitted across a transmission medium in a certain amount of time
Which of the following is NOT a factor to consider when selecting network cabling?
________ cable is NOT subject to electromagnetic interference or radio frequency interference
For business networks, which of the following is NOT a main cable type?
Most home networks use ________ cable, which is most susceptible to interference
_________ is the standard communications protocol used on most client/server networks
The physical address assigned each network adapter is called its _________
Media Access Control (MAC)
A(n) _______ address is the address that external entities use when communicating with your network
A _______ sends data from one collision domain to another
A _________ sends data between two networks
A _______ keeps your computer safe by determining who is trying to access it
Packet _________ is a form of protection for your computer that looks at each packet that comes into your computer network
A(n) ___________ server is a heavily secured server located between a company’s secure internal network and its firewall
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ___________
Brute force attack