Chapter 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

For data, NVT uses US ASCII characters with the highest order bit set to _____.

0

For control, NVT uses US ASCII characters with the highest order bit set to _____.

1

The standard port number for connecting to an SMTP server is _____.

25

_____ provides service to the user to make the process of sending or receiving a message earlier.

A UA

What does API mean?

Advanced Programmings Interface

Choose the protocols that use peer-to-peer architecture.

BitTorrent, Skype

In the domain name space, if a label is terminated by a null string, it is called a _____.

FQDN (none of the above on test)

Choose the protocols that use the client-server architecture.

HTTP, FTP

A registrar, a commercial entity accredited by _____ is responsible for adding new domains to DNS data base.

ICANN

_____ is more efficient over a low-bandwidth connection.

IMAP

In _____, nodes and data items are m-bit identifiers that create an identifier space of 2m points distributed at the leaves of a binary tree.

Kademlia

Trackerless BitTorrent uses _____ DHT to do the job of tracking.

Kademlia

_____ is a supplementary protocol that allows non-ASCII data to be sent through email.

MIME

A _____ server is a computer that transfers the complete information about a zone from another server.

NOT primary

In the domain name space, if a label is not terminated by a null string, it is called a _____.

PQDN

The formal protocol that defines the MTA client and server in the Internet is called _____.

SMTP

The _____ component in the SSH provides confidentiality, integrity, authentication, and compression.

SSH-TRAN

FTP uses the services of _____.

TCP

HTTP uses the services of _____.

TCP

The DNS protocol runs over _____ and uses port _____.

TCP and UDP; 53

The _____ translates local characters into NVT characters.

TELNET client

The _____ translates NVT characters into a form acceptable by the remote operating system.

TELNET server

_____ is a language for creating a static document.

XS, HTML, XML

An HTTP request message always contains _____.

a message line and a header line

In a structured-decentralized P2P network, _____.

a pre-defined set of rules is used to link nodes so that a query can be effectively and efficiently resolved

In HTTP, _____ server is a computer that keeps copies of responses to recent requests

a proxy

Port forwarding in SSH is _____.

a service (provided by SSH, that creates a secure channel for applications that do not have security services)

The root of the DNS tree is _____.

a string of 15 characters

For many applications, we need a program or a script to be run at the client site. These are called _____ documents.

active

Each line in an HTTP request message before the entire body is terminated with _____.

an ASCII 13 character followed by an ASCII 10 character

In the DNS, the names are defined in _____ structure.

an inverted-tree

During an FTP session, the data connection may be opened _____.

as many times as needed

In the _____ encoding scheme, each 24 bits become four 6-bit chunks and are eventually sent as 32 bits.

base 64

Napster is an example of a ______ peer-to-peer network.

centralized

In a centralized P2P network, the directory system uses the _____ paradigm; the storing and downloading of the files are done using _____ paradigm.

client server; peer-to-peer

The HTTP protocol is stateless, but a web server can identify users by using _____.

cookies

In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _____.

data structures

Network Virtual Terminal (NVT) uses two sets of characters, one for _____ and one for _____.

data; control

In Kademlia, each node in the network divides the binary tree into m subtrees that _____.

do not include the node itself

In the domain name space, a _____ is a subtree of the domain name space.

domain

In the domain name space, a full domain name is a sequence of labels separated by _____.

dots

In the domain name space, a full domain name is a sequence of labels separated by ______.

dots

A _____ dynamic document is created by a web server whenever a browser requests the document.

dynamic

DNS can use the services of _____.

either UDP or TCP

A process running on a computer on the Internet is identified by an IP address.

false

In FTP, ASCII, EBCDIC, and image define an attribute called _____.

file type

Which of the following is not a chord interface?

fix node

In a _____ name space, a name is a sequence of characters without structure.

flat

When an SMTP connection is established, the first message is passed _____.

from the server to the client

In a DHT-based network, each peer _____.

has a partial knowledge about the whole network.

An e-mail message contains the _____ and the _____

header; body

An email message contains the _____ and the _____.

header; body

In a _____ name space, each name is made of several parts.

hierarchical

In _____ resolution, the server returns the IP address of the server that it thinks can resolve the query.

iterative

When a user logs into a local time-sharing system, it called _____ login.

local

When a user logs into a local time-sharing system, it is called _____ login.

local

In the Internet, an email address consists of two parts: a _____ and a _____.

local part; domain name

In Kademlia, the distance between two modifiers (nodes or keys) are measured as the bitwise-_____ between them.

none of the above

The finger table is the routing table used in _____.

none of the above

In a _____ connection, one TCP connection is made for each request/response.

nonpersistent

During an FTP session, the control connection is opened _____.

once

In _____, a key is stored in a node whose identifier is numerically closest to the key.

pastry

To resolve a query, _____ uses two entities: a routing table and a leaf set.

pastry

What are the two predominant architecture paradigms used in modern network application?

peer-to-peer, client server

In a _____ connection, the server leaves the connection open for more requests after sending a response.

persistent

A _____ server is a computer that stores a file about the zone for which it has an authority.

primary

The first section of a URL identifier is the _____.

protocol

What are the four basic concepts of this course?

protocol, circuit switching & packet switching, reliability, layered architecture

The message access protocol is a _____ protocol.

pull

SMTP is a _____ protocol.

push

SMTP is primarily a _____ protocol.

push

In the _____ encoding scheme, a non-ASCII character is sent as 3 characters.

quoted-printable

In _____ resolution, the resolver expects the server to supply the final answer.

recursive

When a user wants to access an application program or utility located on a remote machine, he or she performs _____ logins.

remote

In HTTP, the first line in a request message is called a _____ line; the first line in the response message is called the _____ line.

request line; status line (none of the above on test)

An HTTP response line does NOT include _____.

response line

A _____ server is computer whose zone system consists of the whole tree.

root

Transport services available to applications do NOT include _____.

routing

A _____ server is a computer that transfers the complete information

secondary

In a client-server paradigm, a _____ program provides services to another _____ program.

server, client

A ______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only.

static

In FTP, when we _____, it is copied from the client to the server.

store a file

BitTorrent is an example of a _____ peer-to-peer network.

structured-decentralized

TELNET is an abbreviation for _____.

terminal network

In a client-server paradigm, ___________________.

the server must be running all the time but the client needs to be running only when it is needed.

An application layer protocol does NOT define _____.

timing guaranteed on message delivery

In FTP, there are three types of _____: stream, block, and compressed.

transmission modes

A web cache, or proxy server, is a network entity that satisfies HTTP requests on behalf of an origin web server.

true

An HTTP server maintains no information about its clients.

true

HTTP can use both persistent and non-persistent connections.

true

HTTP uses TCP as its underlying transfer protocol.

true

SMTP restricts the body of all mail messages to simple 7-bit ASCII.

true

In FTP, _____ well-known port(s) is/are used.

two

In the common scenario, the electronic mail system needs _____.

two UAs, two pairs of MTAs, and a pair of MAAs.

In the Internet, the country domain section uses _____ country abbreviations.

two-character

In the Internet, the county domain section uses _____ country abbreviations.

two-character

Gnutella is an example of a _____ peer-to-peer network.

unstructured-decentralized

The components of the Internet mail system include _____.

user agents, mail servers, the simple mail transfer protocol

Which of the following is present in both an HTTP request line and a status line?

version number

In the domain name space, what a server is responsible for or has authority over is called a _____.

zone


Ensembles d'études connexes

Slide Studies (Cognitive Neuroscience)

View Set

Ch1 An Introduction to Sustainability Concepts and Principles

View Set

inter mgnt 4.0 (meaning and dimensions of culture)

View Set

Venice italy - 8th wonders of the world

View Set

Chapter 5: PrepU - Infections sexually

View Set

Color Schemes and More about Color

View Set

System Administration and IT Infrastructure Services. Week 5: Data Recovery and Backups

View Set