It consists of two or more computers that are linked together.
What is a Computer Network?
100
What are the 3 most common network scales?
What is LAN, MAN, WAN.
100
Which network topology is the most commonly used?
What is Star Network.
100
The Hard drive of a computer is usually labeled with which drive letter?
What is C.
100
Consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
What is Network Security.
200
Name one way in which networks are linked together?
What is Cables, Telephone lines, Radio waves, Satellites, and Infrared light beams
200
Wireless Local Area Network is also known as what?
What is WiFi.
200
List the four network topologies?
What is Star, Ring, Bus, Mesh.
200
Multitier Architecture is a type of this network.
What is Client-Server.
200
Viruses, worms, and Trojan horses are all examples of what?
What is Malware.
300
Client-Server and Peer to Peer are listed under which classification?
What is Functional Relationship.
300
Which network can connect users nationally or internationally?
What is WAN.
300
Which network topology is most used in WANs?
What is Mesh.
300
A set of standards that governs communications among computing systems.
What is Networking Protocol.
300
Computer system or network that is designed to block unauthorized access
What is Firewall.
400
Scale, Topology, Functional Relationship, and Protocol are all ways that a network is what?
What is classified.
400
List the following network scales in order from smallest to largest. LAN, PAN, WAN, MAN, CAN
What is PAN, LAN, CAN, MAN, WAN.
400
If there is a break in the cable and the network goes down. You are using this type of network topology.
What is Bus.
400
Directories and subdirectories are two forms of this.
What is network file structures.
400
Computer program that replicates itself in order to spread to other computers.
What is Computer Worm.
500
List 2 of the 5 things a computer can do when it is hooked to a network.
What is Share resources, Exchange files, Allow User Communication and Collaboration, Remote access
Data protection.
500
What kind of transmission media type does MAN use?
What is twisted cable or fiber optics.
500
It is wired like a star, but passes control from one device to the next in a continuous fashion.
What is Ring topology.
500
IP, HTTP, TCP, and FTP are all examples of this.
What is protocols.
500
List 2 of the 5 types of defenses for network security.
What is Anti-Virus and Anti-Spyware, Firewalls, Encryption
Intrusion Prevention Systems, Virtual Private Networks.