1. Which of the following is an example of a network node?
A. Twisted pair cable
B. Client-server architecture
C. Printer
D. NOS
2. The network architecture used in most home networks is:
A. client-server LAN.
B. peer-to-peer LAN.
C. client-server WAN.
D. peer-to-peer WAN.
4.3.
Which of the following is most likely
to be configured as a client-server local area network?
A. Two computers connected together
B. Ten or more nodes in a business office
C. All the computers in a multi-national corporation
D. A wireless home network
5.4.
The term that refers to a
communication channel between nodes in a network is:
A. transmission medium.
B. URL.
C. server computer.
D. router.
8.5.
A network interface card is a type of
network:
A. adapter.
B. operating system.
C. adapter only for a P2P network.
D. transmission medium.
10.6.
If you want to maximize the data
transfer rate in your peer-to-peer network, your best option is:
A. power line.
B. Ethernet.
C. phoneline.
D. wireless.
19.7.
A wireless network uses ____________
as its transmission media.
A. cables
B. radio waves
C. twisted pair
D. fiber optics
20.8.
The 802.11 standard pertains to:
A. Ethernet cables.
B. cable routers.
C. wireless networks.
D. connector jacks.
26.9.
If you frequently need to transfer
streaming video or very large files between computers, which of the following
networks would be the best choice?
A. Ethernet
B. wireless
C. power line
D. phoneline
29.10. The
act of bombarding a system with such a high volume of requests that it prevents
legitimate users from accessing the system is called:
A. hacking.
B. zombie creation.
C. denial of service.
D. a Trojan horse.
34.11. A
numbered communication gateway that is assigned for a commonly used network
service such as SMTP or HTTP is called a(n):
A. protocol.
B. Internet portal.
C. logical port.
D. packet filter.
35.12. A
software program designed to prevent unauthorized access to a computer system
is called a(n):
A. firewall.
B. backdoor program.
C. portal.
D. denial of service program.
37.13. A
common method used by firewalls for maximizing computer security is:
A. closing physical ports.
B. blocking access to logical ports.
C. disabling Internet browsers.
D. detecting and removing viruses.
39.14. A
firewall’s ability to examine incoming and outgoing information and prevent the
use of unauthorized logical ports is known as:
A. packet filtering.
B. logical port blocking.
C. network address translation.
D. network key distribution.
42.15. A
computer program that attaches itself to another program and spreads itself to
other computers when files are exchanged is called a:
A. Trojan horse.
B. backdoor program.
C. cracker.
D. virus.
43.16. ____________
viruses will be loaded into memory as soon as the
computer starts up, even before virus detection software can load.
A. Boot-sector
B. Logic bomb
C. Master system
D. Macro
44.17. ____________
viruses are typically attached to document files, such
as those used for word processing or spreadsheets.
A. Document
B. File
C. System
D. Macro
48.18. Unlike
viruses, worms do not:
A. replicate themselves.
B. rely on host files.
C. cause damage to computer systems.
D. have identifying signatures.
49.19. A
virus that executes only when certain conditions occur is called a:
A. worm.
B. conditional virus.
C. stealth virus.
D. logic bomb.
53.20. In
order to ensure that your antivirus software is best able to identify and
destroy the most recently created viruses, you should:
A. use its automatic update feature.
B. reinstall the software periodically.
C. purchase a new version.
D. run it to check your hard-drive.