Technology in Action, Ninth Edition Answer Key Chapter 12

brokenroomΔίκτυα και Επικοινωνίες

21 Νοε 2013 (πριν από 3 χρόνια και 8 μήνες)

775 εμφανίσεις

Technology in Action, Ninth Edition

Answer Key Chapter
12


BUZZ WORDS

W
ord Bank

•authentication server

•bastion host

•bridge

•bus

•centralized

•client/server

•decentralized

•fiber
-
optic

•file server

•LAN

•packet screener

•router

•scalable

•star

•switch

•twisted
-
pair

•WAN

•wireless access point

Instructions: Fill in the blanks using the words from the Word Bank above.

Cheryl’s company was quickly outgrowing its peer
-
to
-
peer network. Cheryl knew she would
need to convert it to a(n) (1)
client/server

network next month. The current network was all in
one building, was composed of 10 nodes, and was classified as a(n) (2)
L
AN
. The new network
would need 35 nodes and would have to connect nodes in the existing building as well as the
new manufacturing facility across town. This new network would be classified as a(n) (3)
WAN
.
The company was using proprietary manufacturing pr
ocesses, so only authorized people would
be permitted to access the network, necessitating the use of a(n) (4)
authentication server
. And
since documents needed to be shared among employees and stored centrally, a(n) (5)
file server

would also be a useful
addition to the new network. The company anticipated hiring an
additional 10 people per month for the next two years, so the network would need to be (6)
scalable
.

Cheryl decided on an Ethernet network using the (7)
star topology
, since this was the most
p
opular and easiest to implement. She knew she would need several network navigation devices
including a(n) (8)
switch

to move the data around the network and a(n) (9)
router

to send data
between the network and the Internet. And as the network grew, she anticipated breaking into
two different collision domains, necessitating a(n) (10)
bridge

to move data between them.
Cheryl had a limited budget, so she knew she would need to

install (11)
twisted
-
pair cable

instead of the (12)
fiber
-
optic

cable that would have given her much faster throughput.

For tight security, Cheryl planned to install a(n) (13)
packet screener

to filter out unauthorized
transmissions of data. And installin
g a(n) (14)
bastion host

on the perimeter network would give
the network an added layer of protection. With this type of network, security would be (15)
centralized
,

making it much more secure than the previous peer
-
to
-
peer network.

s
elf
-
test

I
nstructions:

Answer the multiple
-
choice and true

false questions
below for more practice with
key terms and concepts from this chapter.

Multiple Choice

1
.
Which of the following is an advantage of installing a client/server ne
twork in a business?

a
.
Centralization of network adapters

b
.
Decentralization of network security protection

c
.
Centralization of files and data

d
.
Decentralizaton of peripherals

2
.
Why are client/server networks often installed in businesses instead of peer
-
to
-
peer networks?

a
.
Security is stronger on client/server networks.

b
.
They eliminate the need for dedicated serve
rs.

c
.
They are less scalable than peer
-
to
-
peer networks.

d
.
They are cheaper to install.

3
.
If a city deploys a network to assist in monitoring traffic flow, this network would be
classified as a

a
.
WAN.

c
.
PAN.

b
.
MAN
.

d
.
LAN.

4
.
Which of the following is necessary in every client/server network?

a
.
Packet screener

b
.
Bridge

c
.
Transmission media

d
.
E
-
mail server

5
.
To ensure only authorized users can access a network, which server would a client/server
network include?

a
.
File

b
.
Authentication

c
.
Communications

d
.
Application

6
.
Which type of network topology is most scalable?

a
.
Star

c
.
Ring

b
.
Ethernet
d
.
Bus

7
.
Twisted
-
pair cable most likely would be used in a business network when

a
.
cost is more important than speed.

b
.
electrical or magnetic interference is pres
ent.

c
.
very long cable runs are required.

d
.
speed is more important than cost.

8
.
NOS software is

a
.
needed on all computers in a client/server network.

b
.
needed only on the servers in a client/server network.

c
.
needed only if a communications server is deployed on a client/server network.

d
.
needed only when configuring a network in a star topology.

9
.
On client/server networks, routers

a
.
transfer data between two networks.

b
.
route
date between two collision domains on a single network.

c
.
move data efficiently from node to node on the internal network.

d
. are
necessary only in networks using
the star topology.

1
0.
Providing adequate security on a corporate network involves all of the following issues,
except

a
.
authentication.

b
.
restricting access to servers.

c
.
proprietary software lockout
.

d
.
limiting network access by requiring passwords.

True

False

__
F
___ 1.

Routers

are used to route data between two or more network collision domains.

__
T
___ 2.

Two different types of
network operating software

can be deployed on the same
network.

__
T
___ 3.

Fiber
-
optic

cable is
less

susceptible to interference

than twisted
-
pair cable
.

__
T
___ 4.

Client/server networks are
harder to administer than
peer
-
to
-
peer networks.

__
F
___ 5.

A
n

authentication

server is used to
host Websites

on a client/server network.