1.             Which of the following is an example of a network node?

A.     Twisted pair cable

B.     Client-server architecture

C.     Printer

D.     NOS

2.             The network architecture used in most home networks is:

A.     client-server LAN.

B.     peer-to-peer LAN.

C.     client-server WAN.

D.     peer-to-peer WAN.

4.3.       Which of the following is most likely to be configured as a client-server local area network?

A.     Two computers connected together

B.     Ten or more nodes in a business office

C.     All the computers in a multi-national corporation

D.     A wireless home network

5.4.       The term that refers to a communication channel between nodes in a network is:

A.     transmission medium.

B.     URL.

C.     server computer.

D.     router.

8.5.       A network interface card is a type of network:

A.     adapter.

B.     operating system.

C.     adapter only for a P2P network.

D.     transmission medium.

10.6.   If you want to maximize the data transfer rate in your peer-to-peer network, your best option is:

A.     power line.

B.     Ethernet.

C.     phoneline.

D.     wireless.

19.7.   A wireless network uses ____________ as its transmission media.

A.     cables

B.     radio waves

C.     twisted pair

D.     fiber optics

20.8.   The 802.11 standard pertains to:

A.     Ethernet cables.

B.     cable routers.

C.     wireless networks.

D.     connector jacks.

26.9.   If you frequently need to transfer streaming video or very large files between computers, which of the following networks would be the best choice?

A.     Ethernet

B.     wireless

C.     power line

D.     phoneline

29.10. The act of bombarding a system with such a high volume of requests that it prevents legitimate users from accessing the system is called:

A.     hacking.

B.     zombie creation.

C.     denial of service.

D.     a Trojan horse.

34.11. A numbered communication gateway that is assigned for a commonly used network service such as SMTP or HTTP is called a(n):

A.     protocol.

B.     Internet portal.

C.     logical port.

D.     packet filter.

35.12. A software program designed to prevent unauthorized access to a computer system is called a(n):

A.     firewall.

B.     backdoor program.

C.     portal.

D.     denial of service program.

37.13. A common method used by firewalls for maximizing computer security is:

A.     closing physical ports.

B.     blocking access to logical ports.

C.     disabling Internet browsers.

D.     detecting and removing viruses.

39.14. A firewall’s ability to examine incoming and outgoing information and prevent the use of unauthorized logical ports is known as:

A.     packet filtering.

B.     logical port blocking.

C.     network address translation.

D.     network key distribution.

42.15. A computer program that attaches itself to another program and spreads itself to other computers when files are exchanged is called a:

A.     Trojan horse.

B.     backdoor program.

C.     cracker.

D.     virus.

43.16. ____________ viruses will be loaded into memory as soon as the computer starts up, even before virus detection software can load.

A.     Boot-sector

B.     Logic bomb

C.     Master system

D.     Macro

44.17. ____________ viruses are typically attached to document files, such as those used for word processing or spreadsheets.

A.     Document

B.     File

C.     System

D.     Macro

48.18. Unlike viruses, worms do not:

A.     replicate themselves.

B.     rely on host files.

C.     cause damage to computer systems.

D.     have identifying signatures.

49.19. A virus that executes only when certain conditions occur is called a:

A.     worm.

B.     conditional virus.

C.     stealth virus.

D.     logic bomb.

53.20. In order to ensure that your antivirus software is best able to identify and destroy the most recently created viruses, you should:

A.     use its automatic update feature.

B.     reinstall the software periodically.

C.     purchase a new version.

D.     run it to check your hard-drive.