|
1 | | In a client-server paradigm, a _______ program provides services to a (another) _______ program. |
| | A) | client; client |
| | B) | client; server |
| | C) | server; client |
| | D) | server; server |
|
|
|
2 | | In a client-server paradigm |
| | A) | both the server and the client must be running all the time. |
| | B) | both the server and the client need to be running only when they are needed. |
| | C) | the server must be running all the time but the client needs to be running only when it is needed. |
| | D) | the client must be running all the time but the server needs to be running only when it is needed |
|
|
|
3 | | The first section of a URL identifier is the __________. |
| | A) | protocol |
| | B) | path |
| | C) | host |
| | D) | port |
|
|
|
4 | | A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only. |
| | A) | static |
| | B) | dynamic |
| | C) | active |
| | D) | None of the choices are correct |
|
|
|
5 | | _____________ is a language for creating a static document. |
| | A) | Extensible Style Language (XSL) |
| | B) | Hypertext Markup Language (HTML) |
| | C) | Extensible Markup Language (XML) |
| | D) | All choices are correct |
|
|
|
6 | | A _______ document is created by a Web server whenever a browser requests the document. |
| | A) | static |
| | B) | dynamic |
| | C) | active |
| | D) | None of the choices are correct |
|
|
|
7 | | For many applications, we need a program or a script to be run at the client site. These are called _______________ documents. |
| | A) | static |
| | B) | dynamic |
| | C) | active |
| | D) | None of the choices are correct |
|
|
|
8 | | HTTP uses the services of _________. |
| | A) | UDP |
| | B) | IP |
| | C) | TCP |
| | D) | DNS |
|
|
|
9 | | In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line. |
| | A) | request; response |
| | B) | status; response |
| | C) | status; status |
| | D) | None of the choices are correct |
|
|
|
10 | | In a ___________ connection, one TCP connection is made for each request/response. |
| | A) | persistent |
| | B) | nonpersistent |
| | C) | persistent or a nonpersistent |
| | D) | None of the choices are correct |
|
|
|
11 | | In a ___________ connection, the server leaves the connection open for more requests after sending a response. |
| | A) | persistent |
| | B) | nonpersistent |
| | C) | persistent or nonpersistent |
| | D) | None of the choices are correct |
|
|
|
12 | | In HTTP, _______ server is a computer that keeps copies of responses to recent requests. |
| | A) | a regular |
| | B) | a proxy |
| | C) | an auxiliary |
| | D) | a remote |
|
|
|
13 | | An HTTP request message always contains _______. |
| | A) | a header line and a body |
| | B) | a request line and a header line |
| | C) | a request line, a header line, and a body |
| | D) | a request line, a header line, a blank line, and a body |
|
|
|
14 | | Which of the following is present in both an HTTP request line and a status line? |
| | A) | version number |
| | B) | URL |
| | C) | status code |
| | D) | method |
|
|
|
15 | | FTP uses the services of ________. |
| | A) | UDP |
| | B) | IP |
| | C) | TCP |
| | D) | none of the choices are correct |
|
|
|
16 | | In FTP, _________ well-known port(s) is (are) used. |
| | A) | one |
| | B) | two |
| | C) | three |
| | D) | four |
|
|
|
17 | | During an FTP session the control connection is opened _______. |
| | A) | once |
| | B) | twice |
| | C) | many times |
| | D) | none of the choices are correct |
|
|
|
18 | | During an FTP session the data connection may be opened _______. |
| | A) | only once |
| | B) | only two times |
| | C) | as many times as needed |
| | D) | none of the choices are correct |
|
|
|
19 | | In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _______. |
| | A) | file types |
| | B) | data structures |
| | C) | transmission modes |
| | D) | none of the choices are correct |
|
|
|
20 | | In FTP, there are three types of _______: stream, block, and compressed. |
| | A) | file types |
| | B) | data types |
| | C) | transmission modes |
| | D) | none of the choices are correct |
|
|
|
21 | | In FTP, ASCII, EBCDIC, and image define an attribute called _______. |
| | A) | file type |
| | B) | data structure |
| | C) | transmission mode |
| | D) | none of the choices are correct |
|
|
|
22 | | In FTP, when we _______, it is copied from the client to the server. |
| | A) | retrieve a file |
| | B) | store a file |
| | C) | open a file |
| | D) | none of the choices are correct |
|
|
|
23 | | In the common scenario, the electronic mail system needs _________________________. |
| | A) | two UAs, two MTAs and one MAA |
| | B) | two UAs, two MTAs and two MAAs |
| | C) | two UAs, two pairs of MTAs and a pair of MAAs |
| | D) | two UAs, two pairs of MTAs and a two pairs of MAAs |
|
|
|
24 | | ________ provides service to the user to make the process of sending or receiving a message easier. |
| | A) | An MTA |
| | B) | An MAA |
| | C) | A UA |
| | D) | None of the choices are correct |
|
|
|
25 | | An e-mail message contains the ________ and the __________. |
| | A) | header; envelop |
| | B) | header; body |
| | C) | envelop; body |
| | D) | None of the choices are correct |
|
|
|
26 | | In the Internet, an e-mail address consists of two parts: a _______ and a _______. |
| | A) | local part; domain name |
| | B) | global part; domain name |
| | C) | label; domain name |
| | D) | local part; label |
|
|
|
27 | | _________ is a supplementary protocol that allows non-ASCII data to be sent through e-mail. |
| | A) | SMPT |
| | B) | MPEG |
| | C) | MIME |
| | D) | POP |
|
|
|
28 | | The formal protocol that defines the MTA client and server in the Internet is called ___________. |
| | A) | SMTP |
| | B) | SNMP |
| | C) | TELNET |
| | D) | SSH |
|
|
|
29 | | SMTP is a __________ protocol. |
| | A) | pull |
| | B) | push |
| | C) | push and pull |
| | D) | None of the choices are correct |
|
|
|
30 | | The message access protocol is a ________ protocol. |
| | A) | pull |
| | B) | push |
| | C) | push and pull |
| | D) | None of the choices are correct |
|
|
|
31 | | In the _______ encoding scheme, each 24 bits become four 6-bit chunks, and eventually are sent as 32 bits. |
| | A) | 8bit |
| | B) | binary |
| | C) | base64 |
| | D) | quoted-printable |
|
|
|
32 | | In the _______ encoding scheme, a non-ASCII character is sent as 3 characters. |
| | A) | 8bit |
| | B) | base64 |
| | C) | quoted-printable |
| | D) | binary |
|
|
|
33 | | TELNET is an abbreviation for ____________. |
| | A) | terminal network |
| | B) | telephone network |
| | C) | telecommunication network |
| | D) | None of the choices are correct |
|
|
|
34 | | When a user logs into a local time-sharing system, it is called ________ login. |
| | A) | local |
| | B) | remote |
| | C) | local or remote |
| | D) | None of the choices are correct |
|
|
|
35 | | When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login. |
| | A) | local |
| | B) | remote |
| | C) | local or remote |
| | D) | None of the choices are correct |
|
|
|
36 | | Network Virtual Terminal (NVT) uses two sets of characters, one for _____ and one for __________. |
| | A) | sending; receiving |
| | B) | request; reply |
| | C) | data; control |
| | D) | None of the choices are correct |
|
|
|
37 | | For data, NVT uses US ASCII characters with the highest order bit set to ______. |
| | A) | 1 |
| | B) | 0 |
| | C) | 1 or 0 |
| | D) | None of the choices are correct |
|
|
|
38 | | For control, NVT uses US ASCII characters with the highest order bit set to ______. |
| | A) | 1 |
| | B) | 0 |
| | C) | 1 or 0 |
| | D) | None of the choices are correct |
|
|
|
39 | | The _______ translates local characters into NVT characters. |
| | A) | terminal driver |
| | B) | TELNET client |
| | C) | TELNET server |
| | D) | pseudoterminal driver |
|
|
|
40 | | The _______ translates NVT characters into a form acceptable by the remote operating system. |
| | A) | terminal driver |
| | B) | TELNET client |
| | C) | TELNET server |
| | D) | pseudoterminal driver |
|
|
|
41 | | The _________ component in the SSH provides confidentiality, integrity, authentication and compression. |
| | A) | SSH Application |
| | B) | SSH-AUTH |
| | C) | SSH-CONN |
| | D) | SSH-TRAN |
|
|
|
42 | | Port forwarding is ____________________________. |
| | A) | a protocol used to forward messages from one port to another port |
| | B) | a procedure for changing an ephemeral port to a well-known port |
| | C) | a service, provided by SSH, that creates a secure channel for applications that do not have security services. |
| | D) | None of the choices are correct |
|
|
|
43 | | In a _______ name space, a name is a sequence of characters without structure. |
| | A) | linear |
| | B) | flat |
| | C) | hierarchical |
| | D) | organized |
|
|
|
44 | | In a _________ name space, each name is made of several parts. |
| | A) | linear |
| | B) | flat |
| | C) | hierarchical |
| | D) | organized |
|
|
|
45 | | In the DNS, the names are defined in ___________ structure. |
| | A) | a linear list |
| | B) | an inverted-tree |
| | C) | a three-dimensional |
| | D) | None of the choices are correct |
|
|
|
46 | | The root of the DNS tree is _______. |
| | A) | a string of 127 characters |
| | B) | a string of 63 characters |
| | C) | a string of 15 characters |
| | D) | an empty string |
|
|
|
47 | | In the domain name space, a full domain name is a sequence of labels separated by ________. |
| | A) | colons |
| | B) | semicolons |
| | C) | dots |
| | D) | commas |
|
|
|
48 | | In the domain name space, if a label is terminated by a null string, it is called a __________. |
| | A) | PQDN |
| | B) | CQDN |
| | C) | SQDN |
| | D) | None of the choices are correct |
|
|
|
49 | | In the domain name space, if a label is not terminated by a null string, it is called a __________. |
| | A) | FQDN |
| | B) | PQDN |
| | C) | SQDN |
| | D) | None of the choices are correct |
|
|
|
50 | | In the domain name space, a _________ is a subtree of the domain name space. |
| | A) | label |
| | B) | name |
| | C) | domain |
| | D) | None of the choices are correct |
|
|
|
51 | | In the domain name space, what a server is responsible for or has authority over is called a _________. |
| | A) | domain |
| | B) | label |
| | C) | zone |
| | D) | None of the choices are correct |
|
|
|
52 | | A _______ server is a computer whose zone system consists of the whole tree. |
| | A) | domain |
| | B) | zone |
| | C) | root |
| | D) | primary |
|
|
|
53 | | A ________ server is a computer that stores a file about the zone for which it has an authority. |
| | A) | primary |
| | B) | secondary |
| | C) | zone |
| | D) | root |
|
|
|
54 | | A ________ server is a computer that transfers the complete information about a zone from another server. |
| | A) | primary |
| | B) | secondary |
| | C) | zone |
| | D) | root |
|
|
|
55 | | In the Internet, the country domain section uses ___________ country abbreviations. |
| | A) | two-character |
| | B) | three-character |
| | C) | four-character |
| | D) | None of the choices are correct |
|
|
|
56 | | In __________ resolution, the resolver expects the server to supply the final answer. |
| | A) | iterative |
| | B) | recursive |
| | C) | straight |
| | D) | None of the choices are correct |
|
|
|
57 | | In __________ resolution, the server returns the IP address of the server that it thinks can resolve the query. |
| | A) | iterative |
| | B) | recursive |
| | C) | straight |
| | D) | None of the choices are correct |
|
|
|
58 | | DNS can use the services of ________. |
| | A) | UDP |
| | B) | TCP |
| | C) | either UDP or TCP |
| | D) | None of the choices are correct |
|
|
|
59 | | A registrar, a commercial entity accredited by ________ is responsible for adding new domains to DNS data base |
| | A) | NIC |
| | B) | ICANN |
| | C) | ISOC |
| | D) | IEFE |
|
|
|
60 | | In a centralized P2P network, the directory system uses the ________ paradigm; the storing and downloading of the files are done using __________ paradigm. |
| | A) | client-server; client-server |
| | B) | peer-to-peer; client-server |
| | C) | client-server; peer-to-peer |
| | D) | peer-to-peer; peer-to-peer |
|
|
|
61 | | Napster is an example of a ____________ peer-to-peer network |
| | A) | centralized |
| | B) | structured-decentralized |
| | C) | unstructured-decentralized |
| | D) | None of the choices are correct |
|
|
|
62 | | Gnutella is an example of a ____________ peer-to-peer network |
| | A) | centralized |
| | B) | structured-decentralized |
| | C) | unstructured-decentralized |
| | D) | None of the choices are correct |
|
|
|
63 | | BitTorrent is an example of a ____________ peer-to-peer network |
| | A) | centralized |
| | B) | structured-decentralized |
| | C) | unstructured-decentralized |
| | D) | None of the choices are correct |
|
|
|
64 | | In a structured-decentralized P2P network, ________________. |
| | A) | the directory system is kept in a center |
| | B) | a query to find a file must be flooded through the network |
| | C) | a pre-defined set of rules is used to link nodes so that a query can be effectively and efficiently resolved |
| | D) | None of the choices are correct |
|
|
|
65 | | In a DHT-based network, each peer |
| | A) | has a partial knowledge about the whole network. |
| | B) | has a complete knowledge about the whole network. |
| | C) | only has a knowledge about its successor. |
| | D) | None of the choices are correct |
|
|
|
66 | | The finger table is the routing table used in ______________. |
| | A) | Gnutella |
| | B) | Pastry |
| | C) | Kademlia |
| | D) | None of the choices are correct |
|
|
|
67 | | Which of the following is not a Chord interface. |
| | A) | Lookup |
| | B) | Fix node |
| | C) | Stabilize |
| | D) | Join |
|
|
|
68 | | In __________ a key is stored in a node whose identifier is numerically closest to the key. |
| | A) | Chord |
| | B) | Pastry |
| | C) | Kademlia |
| | D) | None of the choices are correct |
|
|
|
69 | | To resolve a query, _________ uses two entities: a routing table and a leaf set. |
| | A) | Chord |
| | B) | Pastry |
| | C) | Kademlia |
| | D) | None of the choices are correct |
|
|
|
70 | | In Kademlia, the distance between the two identifiers (nodes or keys) are measured as the bitwise-___________ between them. |
| | A) | AND |
| | B) | NOR |
| | C) | OR |
| | D) | None of the choices are correct |
|
|
|
71 | | In ________, nodes and data items are m-bit identifiers that create an identifier space of 2m points distributed at the leaves of a binary tree |
| | A) | Chord |
| | B) | Pastry |
| | C) | Kademlia |
| | D) | None of the choices are correct |
|
|
|
72 | | In Kademlia, each node in the network divides the binary tree into m subtrees that. |
| | A) | include the node itself |
| | B) | do not include the node itself |
| | C) | include the node itself and the successor node |
| | D) | None of the choices are correct |
|
|
|
73 | | Trackerless BitTorrent uses __________ DHT to do the job of tracking. |
| | A) | Chord |
| | B) | Pastry |
| | C) | Kademlia |
| | D) | None of the choices are correct |
|
|