Textbook Chapter 2 quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

The finger table is the routing table used in __________.

- Gnutella - Pastry - Kademlia None of the choices are correct

In Kademlia, the distance between the two identifiers (nodes or keys) are measured as the bitwise-___________ between them.

-AND -NOR -OR None of the choices are correct

In HTTP, the first line in a request message is called a __________ line; the first line in the response message is called the __________ line.

-request; response -status; response -status; status NONE OF THE CHOICES ARE CORRECT

for data, NVT uses US ASCII characters with the highest order bit set to ________.

0

for control, NVT uses US ASCII characters with the highest order bit set to _____________.

1

_______ provides service to the user to make the process of sending or receiving a message easier.

A UA

In the DNS, the names are defined in ____________ structure.

An inverted-tree

In the domain name space, a ___________ is a subtree of the domain name space.

Domain

A _____________ document is created by a Web server whenever a browser requests the document

Dynamic

_____________ is a language for creating a static document.

Extensible Style Language(XSL) Hypertext Markup Language(HTML) Extensible Markup Language (XML) ALL CHOICES ARE CORRECT

Which of the following is not a Chord interface

Fix node

A registrar, a commercial entity accredited by ____ is responsible for adding new domains to DNS data base

ICANN

In ________, nodes and data items are m-bit identifiers that create an identifier space of 2m points distributed at the leaves of a binary tree

Kademlia

Trackerless BitTorrent uses __________ DHT to do the job of tracking

Kademlia

___________ is a supplementary protocol that allow non-ASCII data to be sent through e-mail.

MIME

In the domain name space, if a label is not terminated by a null string, it is called a

PQDN

In the domain name space, if a label is terminated by a null string, it is called

PQDN CQDN SQDN NONE OF THE CHOICE ARE CORRECT

In __________ a key is stored in a node whose identifier is numerically closest to the key.

Pastry

To resolve a query, _________ uses two entities: a routing table and a leaf set.

Pastry

the formal protocol that defines the MTA client and server in the Internet is called

SMTP

The _______ component in the SSH provides confidentiality, integrity, authentication and compression.

SSH-TRAN

In a client-server paradigm, a _______ program provides services to a (another) _______ program.

Server; Client

FTP uses the services of ____________.

TCP

HTTP uses the services of______________.

TCP

The __________ translates local characters into NVT characters.

TELNET client

The _________ translates NVT characters into a form acceptable by the remote operating system.

TELNET server

In a client-server paradigm

The server must be running all the time but the client needs to be running only when it is needed.

Which of the following is present in both an HTTP request line and a status line?

Version number

In a structured-decentralized P2P network, _________________.

a pre-defined set of rules is used to link nodes so that a query can be effectively and efficiently resolved

In HTTP, _______ server is a computer that keeps copies of responses to recent request.

a proxy

An HTTP request message always contains __________.

a request line and a header line

port forwarding is ______________.

a service, provided by SSH, that creates a secure channel for applications that do not have security services.

The root of the DNS tree is_______.

a strong of 15 characters.

For many applications, we need a program or a script to be run at the client site. These are called ____________ documents.

active

During an FTP session the data connection may be opened ______.

as many times as needed

In the _________ encoding scheme, each 24 bits become four 6-bit chunks, and eventually are sent as 32 bits.

base64

Napster is an example of a _____ peer to peer network

centralized

In a centralized P2P network, the directory system uses the ____ paradigm; the storing and downloading of the files are done using ____ paradigm

client-server; peer to peer

In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called_____________.

data structures

Network Virtual Terminal (NVT) uses two sets of characters, one for ________ and one for _____________.

data; control

In Kademlia, each node in the network divides the binary tree into m subtrees that

do not include the node itself

n the domain name space, a full domain name is sequence of labels separated by _____________.

dots

DNS can use the services of ____.

either UDP or TCP

In FTP, ASCII, EBCDIC, and image define an attribute called ____________.

file type

In a _________ name space, a name is a sequence or characters without structure.

flat

In a DHT-based network, each peer

has a partial knowledge about the whole network

An e-mail message contains the ____________ and the ____________.

header; body

In a __________ name space, each name is made of several parts.

hieracrchinal

In _____ resolution, the server returns the IP address of the server that is thinks can resolve the query.

iterative

When a user logs into a local time-sharing system, it is called _______ login.

local

In the Internet, an e-mail address consists of two parts: a ________ and a _________.

local part; domain name

In a _________ connection, one TCP connection is made for each request/response.

nonpersistent

During an FTP session the control connection is opened _______.

once

In a ______________ connection, the server leaves the connection open for more request after sending a response.

persistent

A _____ server is a computer that stores a file about the zone for which it has an authority

primary

The first section of a URL identifier is the __________.

protocol

The message access protocol is a ____________ protocol

pull

SMTP is ____________ protocol

push

In the _________ encoding scheme, a non- ASCII character is sent as 3 characters.

quoted-printable

In _____ resolution, the resolver expects the server to supply the final answer.

recursive

When a user wants to access an application program or utility located on a remote machine, he or she performs _________ login.

remote

A ______________ server is a computer whose zone system consists of the whole tree.

root

A ____ server is a computer that transfers the complete information about a zone from another server.

secondary

A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only.

static

In FTP, when we ___________, it is copies from the client to the server.

store a file

BitTorrent is an example of a ____ peer to peer network

structured- decentralized

TELNET is an abbreviation for

terminal network

In FTP, there are three types of __________: stream, block, and compressed

transmission modes

In FTP, ___________ well-known port(s) is (are) used.

two

In the common scenario, the electronic mail system needs _______________.

two UAs, two pairs of MTAs and a pair of MAAs

In the internet, the country domain section uses _______ country abbreviations.

two-character

Gnutella is an example of a ______ peer to peer network

unstructured- decentralized

In the domain name space, what a server is responsible for or has authority over is called a _____________.

zone


Conjuntos de estudio relacionados

Anatomy & Physiology - Chapter 10

View Set