Computer Networks Flashcards
Which of these is a disadvantage of client-server networks?
Managing servers requires a dedicated staff.
What type of remote network provides a private tunnel through public cloud (the Internet)?
Virtual private network.
What form of remote network access is often the only choice for rural or remote areas?
Dial-up.
What does Wi-Fi use to carry network signals to the network access point?
Radio waves.
What item below is not found in the Active Directory structure?
Wi-Fi.
What is configured to provide or deny users access to service on a local computer or on the
local network/domain?
Profile.
User accounts are uniquely identified by the
SID.
Groups in active directory are directory
objects.
Members of this group have full control of the server or individual workstations and can
assign user rights and access control permissions.
Local Administrators.
Which item resides on a domain controller and provides access to network resources
throughout the domain?
Domain groups.
What is used to organize different types of accounts into manageable units?
A group.
What is installed on a computer to act as the interface between the computer and network?
NIC.
What is the unique identification number a network interface card (NIC) provides to a
personal computer?
MAC address.
How many connector interfaces does a network interface card (NIC) provide for network
cables?
4.
What software activates the actual transmission and receipt of data over the network?
Network interface drivers.
Which information is not required when configuring Transmission Control Protocol/Internet
Protocol (TCP/IP)?
Media Access Control address.
What stores print jobs in a print queue until a printer becomes available?
Print server.
Which is not a transmission medium for a wireless local area network?
Fiber optics.
On a network, what system manages network resources, allows other resources to be shared
across the network, and provides the security necessary in a multi-user environment?
NOS.
In a network environment, what may be responsible for all or some of the network
operational tasks?
Server.
What are the two major ways to implement a client server network?
Thick/thin.
What access control uses segregation of duties and security screening for users?
Administrative.
The Public Key Infrastructure component that would be necessary if the private key of a
key holder was compromised is referred to as the certificate
revocation.
What is an electronic credit card-like device that establishes your credentials when doing
business or other transactions on the Internet?
Digital certificate.
How does a router send information to the internet on a wireless network?
An Ethernet connection.
What device receives information from the internet and translates it into a radio signal and
sends it to the computer’s wireless adapter?
Router.
What piece of equipment is at the core of most Wi-Fi networks?
Router.
If this security feature is enabled on a wireless network, access points or routers perform
additional checks, helping prevent network break-ins.
MAC address filtering.
What drives faster processing speeds and increases the power of many computers and
communication devices?
Nanotechnology.
How much power does a NAND drive require?
<2 watts.
What technology involves the capture and storage of a distinctive, measurable
characteristic, feature, or trait of an individual for later recognition by automated means?
Biometrics.
Which is not a valid form of identity management?
Hair.
What protocol provides an almost unlimited number of Internet Protocol addresses?
IPv6.