Textbook Chapter 2 quiz
The finger table is the routing table used in __________.
- Gnutella - Pastry - Kademlia None of the choices are correct
In Kademlia, the distance between the two identifiers (nodes or keys) are measured as the bitwise-___________ between them.
-AND -NOR -OR None of the choices are correct
In HTTP, the first line in a request message is called a __________ line; the first line in the response message is called the __________ line.
-request; response -status; response -status; status NONE OF THE CHOICES ARE CORRECT
for data, NVT uses US ASCII characters with the highest order bit set to ________.
0
for control, NVT uses US ASCII characters with the highest order bit set to _____________.
1
_______ provides service to the user to make the process of sending or receiving a message easier.
A UA
In the DNS, the names are defined in ____________ structure.
An inverted-tree
In the domain name space, a ___________ is a subtree of the domain name space.
Domain
A _____________ document is created by a Web server whenever a browser requests the document
Dynamic
_____________ is a language for creating a static document.
Extensible Style Language(XSL) Hypertext Markup Language(HTML) Extensible Markup Language (XML) ALL CHOICES ARE CORRECT
Which of the following is not a Chord interface
Fix node
A registrar, a commercial entity accredited by ____ is responsible for adding new domains to DNS data base
ICANN
In ________, nodes and data items are m-bit identifiers that create an identifier space of 2m points distributed at the leaves of a binary tree
Kademlia
Trackerless BitTorrent uses __________ DHT to do the job of tracking
Kademlia
___________ is a supplementary protocol that allow non-ASCII data to be sent through e-mail.
MIME
In the domain name space, if a label is not terminated by a null string, it is called a
PQDN
In the domain name space, if a label is terminated by a null string, it is called
PQDN CQDN SQDN NONE OF THE CHOICE ARE CORRECT
In __________ a key is stored in a node whose identifier is numerically closest to the key.
Pastry
To resolve a query, _________ uses two entities: a routing table and a leaf set.
Pastry
the formal protocol that defines the MTA client and server in the Internet is called
SMTP
The _______ component in the SSH provides confidentiality, integrity, authentication and compression.
SSH-TRAN
In a client-server paradigm, a _______ program provides services to a (another) _______ program.
Server; Client
FTP uses the services of ____________.
TCP
HTTP uses the services of______________.
TCP
The __________ translates local characters into NVT characters.
TELNET client
The _________ translates NVT characters into a form acceptable by the remote operating system.
TELNET server
In a client-server paradigm
The server must be running all the time but the client needs to be running only when it is needed.
Which of the following is present in both an HTTP request line and a status line?
Version number
In a structured-decentralized P2P network, _________________.
a pre-defined set of rules is used to link nodes so that a query can be effectively and efficiently resolved
In HTTP, _______ server is a computer that keeps copies of responses to recent request.
a proxy
An HTTP request message always contains __________.
a request line and a header line
port forwarding is ______________.
a service, provided by SSH, that creates a secure channel for applications that do not have security services.
The root of the DNS tree is_______.
a strong of 15 characters.
For many applications, we need a program or a script to be run at the client site. These are called ____________ documents.
active
During an FTP session the data connection may be opened ______.
as many times as needed
In the _________ encoding scheme, each 24 bits become four 6-bit chunks, and eventually are sent as 32 bits.
base64
Napster is an example of a _____ peer to peer network
centralized
In a centralized P2P network, the directory system uses the ____ paradigm; the storing and downloading of the files are done using ____ paradigm
client-server; peer to peer
In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called_____________.
data structures
Network Virtual Terminal (NVT) uses two sets of characters, one for ________ and one for _____________.
data; control
In Kademlia, each node in the network divides the binary tree into m subtrees that
do not include the node itself
n the domain name space, a full domain name is sequence of labels separated by _____________.
dots
DNS can use the services of ____.
either UDP or TCP
In FTP, ASCII, EBCDIC, and image define an attribute called ____________.
file type
In a _________ name space, a name is a sequence or characters without structure.
flat
In a DHT-based network, each peer
has a partial knowledge about the whole network
An e-mail message contains the ____________ and the ____________.
header; body
In a __________ name space, each name is made of several parts.
hieracrchinal
In _____ resolution, the server returns the IP address of the server that is thinks can resolve the query.
iterative
When a user logs into a local time-sharing system, it is called _______ login.
local
In the Internet, an e-mail address consists of two parts: a ________ and a _________.
local part; domain name
In a _________ connection, one TCP connection is made for each request/response.
nonpersistent
During an FTP session the control connection is opened _______.
once
In a ______________ connection, the server leaves the connection open for more request after sending a response.
persistent
A _____ server is a computer that stores a file about the zone for which it has an authority
primary
The first section of a URL identifier is the __________.
protocol
The message access protocol is a ____________ protocol
pull
SMTP is ____________ protocol
push
In the _________ encoding scheme, a non- ASCII character is sent as 3 characters.
quoted-printable
In _____ resolution, the resolver expects the server to supply the final answer.
recursive
When a user wants to access an application program or utility located on a remote machine, he or she performs _________ login.
remote
A ______________ server is a computer whose zone system consists of the whole tree.
root
A ____ server is a computer that transfers the complete information about a zone from another server.
secondary
A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only.
static
In FTP, when we ___________, it is copies from the client to the server.
store a file
BitTorrent is an example of a ____ peer to peer network
structured- decentralized
TELNET is an abbreviation for
terminal network
In FTP, there are three types of __________: stream, block, and compressed
transmission modes
In FTP, ___________ well-known port(s) is (are) used.
two
In the common scenario, the electronic mail system needs _______________.
two UAs, two pairs of MTAs and a pair of MAAs
In the internet, the country domain section uses _______ country abbreviations.
two-character
Gnutella is an example of a ______ peer to peer network
unstructured- decentralized
In the domain name space, what a server is responsible for or has authority over is called a _____________.
zone