logo image

Ch 12: Behind the Scenes: Networking and Security in the Business World

centralization of network security protection
Which of the following is an advantage of installing a client/server network in a business?
a. centralization of network adapters
b. centralization of network security protection
c. decentralization of files and data
d. decentralization of peripherals
Security is stronger on client/server networks.
Why are P2P networks not usually installed in businesses?
b. They require dedicated servers.
c. They are more scalable than client/server networks.
d. Client/server networks are cheaper to install.
To manage connections with outside networks, which server would a client/server net-work include?
a. Internet
b. authentication
d. application
Which type of network topology is most popular?
a. bus b. Ethernet
c. ring d.
A private network set up by a business that is used exclusively by a select group of em-ployees and suppliers is known as a(n):
a. MAN
c. PAN
d. vendor network
Client/server networks are less difficult to administer than P2P networks.
A file server is used to host websites on a client/server network.
bastion host
Which of the following is NOT necessary in every client/server network?
b. network adapters
c. transmission media
d. NOS software
electrical or magnetic interference is present.
Fiber-optic cable most likely would be used in a business network when
a. saving money is more important than speed.
c. very short cable runs are required.
d. the installation budget is very limited.
on all computers in a client/server network.
NOS software is needed
b. only on the servers in a client/server network.
c. only if a communications server is deployed on a client/server network.
d. only when configuring a network in a star topology.
route data between two collision domains on a single network.
On client/server networks, bridges
a. transfer data between two networks.
c. move data efficiently from node to node on the internal network.
d. are necessary only in networks using the ring topology.
proprietary software lockout.
Providing adequate security on a corporate network involves all of the following issues, except
a. authentication.
b. restricting access to servers.
d. limiting network access by requiring passwords.
Routers are used to route data between two different networks.
Two different types of network operating software cannot be deployed on the same net-work.

Need essay sample on "Ch 12: Behind the Scenes: Networking and Security in the Business World"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
Complete Buyer Protection
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy