Chapter 11 Networked Applications

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

92) Which element of the Skype network is in charge of signaling? A) The login server. B) Host nodes. C) Super nodes.

C) Super nodes.

103) If most P2P applications use facilitating servers, why do we still call them peer-to-peer? A) We accept sloppy terminology. B) We do NOT still call them peer-to-peer. C) User computers do most of the work. D) P2P applications do NOT use servers.

C) User computers do most of the work.

57) Which of the following is not an issue for cloud utility computing? A) The possibility of losing access. B) The possibility of getting locked into proprietary software. C) Very high costs. D) Security concerns. E) Legal complications.

C) Very high costs.

73) The purpose of ________ is to allow a calling program to understand how to use a service object. A) SOAP B) XML C) WDSL D) UDDI

C) WDSL

40) In HTTP, fields normally are ended by ________. A) a colon (:) B) a space C) a carriage return D) a blank line E) All of the above.

C) a carriage return

35) HTTP is used at the ________ layer. A) physical B) data link C) application D) internet E) transport

C) application

44) In HTTP response messages, the attached file is preceded by a ________. A) colon (:) B) space C) blank line D) All of the above.

C) blank line

A traditional e-mail user retrieving messages from his or her mail server could use ________. A) IMAP standard B) POP standard C) either IMAP or POP standard D) SMTP standard

C) either IMAP or POP standard

5) Processing is done only on a centralized machine in the ________ architecture. A) client/server B) P2P C) terminal—host D) None of the above

C) terminal—host

85) In BitTorrent, a ________ is a server that coordinates the file transfer. A) swarm B) browser C) tracker D) None of the above.

C) tracker

36) Which of the following is used to retrieve Web pages? A) HTTP. B) HTML.

A) HTTP.

84) In BitTorrent, ________ give information about specific files and where they are stored. A) .torrent files B) swarms C) Neither A nor B

A) .torrent files

76) Which of the following is true? A) A Web service is one way to implement a SOA. B) A Web service is one way to implement SOAP. C) Both A and B D) Neither A nor B

A) A Web service is one way to implement a SOA.

88) The main advantage of ________ file sharing is that it brings cost savings by using clients rather than server processing power. A) BitTorrent B) client/server C) Both A and B D) Neither A nor B

A) BitTorrent

55) Which of the following is an attraction of cloud utility computing? A) Flexibility. B) Control over operations. C) Both A and B D) Neither A nor B

A) Flexibility.

79) Transient client presence tends to be a problem in ________. A) P2P applications B) client/server applications C) Both A and B D) Neither A nor B

A) P2P applications

27) Which of the following is likely to dominate in VoIP? A) SIP. B) H.323.

A) SIP.

47) In cloud ________, the user accesses the software over the Internet, often with a browser. A) SaaS B) utility computing

A) SaaS

61) In virtualization, each virtual machine acts like a stand-alone computer to its users. A) True. B) False.

A) True.

82) In BitTorrent file sharing, you download parts of the file simultaneously from multiple peers. A) True. B) False.

A) True.

100) The detailed method of Skype's encryption for confidentiality is unknown. A) True. B) False.

A) True.

4) Terminal—host systems tend to have poor response times compared with client/server processing. A) True. B) False.

A) True.

45) Cloud computing is a form of computing where the company outsources some combination of servers, server applications, and client PC software to a cloud service provider. A) True. B) False.

A) True.

53) Utility computing is usually offered as a pay-as-you-go service. A) True. B) False.

A) True.

59) Virtualization has contributed to the popularity of cloud computing. A) True. B) False.

A) True.

62) When deciding whether to use cloud computing, a company must consider security risk. A) True. B) False.

A) True.

68) SOAs are language-independent. A) True. B) False.

A) True.

7) Viewing webpages with a Web browser is an example of a client/server architecture. A) True. B) False.

A) True.

78) Which of the following is considered a bigger problem with traditional client/server based architectures than with peer-to-peer architectures? A) Underutilized processing capacity of client PCs. B) Potential for essential data/services to become unavailable as a device is turned off. C) Both A and B D) Neither A nor B

A) Underutilized processing capacity of client PCs.

69) ________ use ________ that provide services to customers using WWW interaction standards. A) Web services, service objects B) Service objects, web services

A) Web services, service objects

41) In HTTP, keywords usually are followed by ________. A) a colon (:) B) a space C) a carriage return D) a blank line E) All of the above.

A) a colon (:)

2) Users are primarily concerned about the ________ layer. A) application B) transport C) internet D) data link E) physical

A) application

The Trojan horse placed on the first compromised GHOSTNET client could ________. A) conduct audio and video surveillance B) delete files C) both A and B D) neither A nor B

A) conduct audio and video surveillance

3) In terminal—host systems, almost all processing is done on the ________. A) host B) terminal C) Both of the above do a good deal of processing. D) server

A) host

81) In ________ file sharing, you always download the entire file from a single host. A) most P2P B) BitTorrent C) Both A and B D) Neither A nor B

A) most P2P

8) RFC 822 and RFC 2822 standards govern ________. A) plain text content of e-mail messages B) HTTP page contents C) HTML commands and content D) plain text, graphic, and video content of e-mail messages E) HTML commands

A) plain text content of e-mail messages

26) SIP is a ________ protocol for VoIP. A) signaling B) transport C) Both A and B D) Neither A nor B

A) signaling

86) In BitTorrent, the group of all connected computers that have all or part of the file to be downloaded is called the ________. A) swarm B) browser C) tracker D) None of the above.

A) swarm

When an e-mail user encrypts an outgoing messages with SSL/TLS, how far will this encryption extend? A) to the sender's e-mail server B) to the receiver's e-mail server C) to the receiver's client host D) to an application program on the receiver's client host

A) to the sender's e-mail server

52) In ________, a company offloads server processing work to another company at a remote site. A) utility computing B) Software as a Service C) None of the above.

A) utility computing

20) According to the principle of defense in depth, antivirus filtering should be done in at least ________ location(s). A) 1 B) 2 C) 3

B) 2

19) Which of the following offers more reliable antivirus protection? A) Antivirus software on user PCs. B) Antivirus software on the mail server. C) Both A and B are about equally reliable.

B) Antivirus software on the mail server.

18) If companies place antivirus software on all of their client PCs, this will stop almost all virus infections. A) True. B) False.

B) False.

21) VoIP is the transmission of telephone signals over circuit-switched networks. A) True. B) False.

B) False.

23) Telephones that can plug directly into a VoIP network are called PCs with multimedia hardware and added software. A) True. B) False.

B) False.

24) A media gateway connects a client computer or VoIP phone to the VoIP network. A) True. B) False.

B) False.

50) Utility computing is a new phenomenon. A) True. B) False.

B) False.

63) A service-oriented architecture is an application architecture in which a few large programs interact to provide a unified service. A) True. B) False.

B) False.

70) The terms SOA and Web services mean the same thing. A) True. B) False.

B) False.

71) By definition, Web services are implemented using SOAP. A) True. B) False.

B) False.

77) To be considered a peer-to-peer application architecture, there can be no dedicated servers included on the network. A) True. B) False.

B) False.

99) Skype's security protocols have been publicly studied and approved. A) True. B) False.

B) False.

37) Which of the following is used in webpage bodies? A) HTTP. B) HTML. C) Both A and B D) Neither A nor B

B) HTML.

93) Which element of the Skype network is in charge of transport? A) The login server. B) Host nodes. C) Super nodes.

B) Host nodes.

90) Which of the following is not one of the main elements of the Skype network? A) Login server. B) Proxy server. C) Host node. D) Super node.

B) Proxy server.

34) Codec data comes after the ________ header in VoIP transport frames. A) IP B) RTP C) UDP D) Ethernet E) TCP

B) RTP

13) ________ depend on the ability of mail servers to store messages. A) Senders B) Receivers

B) Receivers

102) Which of the following is a processor-sharing application? A) BitTorrent. B) SETI@home. C) SIP. D) Skype.

B) SETI@home.

94) Which of the following steps in Skype is done P2P? A) Login. B) Signaling. C) Both A and B D) Neither A nor B

B) Signaling.

30) For the transport layer, VoIP uses ________ for transport transmission. A) TCP B) UDP C) codec standards D) IP E) Ethernet

B) UDP

33) Which header comes SECOND in a VoIP transport packet? A) RTP. B) UDP. C) IP. D) Application.

B) UDP.

16) Which of the following allows you to read your e-mail easily at Internet cafés? A) POP. B) Web-enabled e-mail. C) Both A and B D) Neither A nor B

B) Web-enabled e-mail.

72) In SOA, SOAP messages are encoded in ________. A) HTML B) XML C) Both A and B D) Neither A nor B

B) XML

10) SMTP is a standard used at the ________ layer to transfer mail messages. A) physical B) application C) internet D) data link E) transport

B) application

80) In ________ file retrieval, your computer downloads a file from a server. A) P2P B) client/server C) BitTorrent D) None of the above.

B) client/server

28) VoIP users often have ________ in their phones or on their computers. A) media gateways B) codecs C) Both A and B D) Neither A nor B

B) codecs

101) The Skype protocol is relatively ________ for corporate firewalls to filter. A) easy B) difficult

B) difficult

91) In Skype, ________ is the process where a Skype application looks up the username and IP address of the party it wants to contact. A) login B) directory search C) transport D) signaling

B) directory search

83) In BitTorrent, a(n) ________ website is a site the BitTorrent client program goes to in order to get .torrent files. A) swarm B) index C) tracker D) None of the above.

B) index

32) RTP supports ________. A) faster transmission speed B) jitter control C) Both A and B D) Neither A nor B

B) jitter control

22) VoIP uses ________ switching. A) circuit B) packet C) Either A or B

B) packet

42) The code "200" may be found in HTTP ________ messages. A) request B) response C) Both A and B D) Neither A nor B

B) response

66) In SOA, access to service objects is ________. A) ad hoc B) standardized C) Either a. not b. D) Neither A nor B

B) standardized

14) The most widely used standard for downloading e-mail to e-mail clients is ________. A) the IMAP standard B) the POP standard C) The IMAP and POP standards are equally popular. D) the SMTP standard

B) the POP standard

97) Signaling is done using servers (not P2P) in ________. A) Skype B) traditional VoIP C) Both A and B D) Neither A nor B

B) traditional VoIP

60) In virtualization, the real computer's capacity is divided among a number of ________. A) hypervisors B) virtual machines C) Neither A nor B

B) virtual machines

15) If you are using a Web-enabled e-mail system ________. A) you have to install a special Web-enabled e-mail client to access your e-mail B) you access and send mail by using a Web browser C) you are more likely to be susceptible to viruses being introduced on your computer D) you are unable to send/receive e-mail messages containing information other than letters or numbers

B) you access and send mail by using a Web browser

39) How many HTTP request-response cycles are needed to transfer a webpage containing 88 lines of text and three different images? A) 1. B) 3. C) 4. D) 88. E) 91.

C) 4.

17) Antivirus software checks e-mail attachments for ________. A) viruses B) Trojan horses C) Both A and B D) Neither A nor B

C) Both A and B

25) A media gateway translates ________ transmissions. A) signaling B) transport C) Both A and B D) Neither A nor B

C) Both A and B

29) Speech codecs vary with respect to ________. A) compression B) voice quality C) Both A and B D) Neither A nor B

C) Both A and B

46) SaaS software vendors may make an application available by ________. A) hosting it on their own webservers B) allowing the application to be downloaded to the consumer device C) Both A and B D) Neither A nor B

C) Both A and B

51) Which of the following services predates cloud computing? A) Software as a Service. B) Utility computing. C) Both A and B D) Neither A nor B

C) Both A and B

54) If a company runs its own data center, it might face problems with ________. A) overprovisioning B) underprovisioning C) Both A and B D) Neither A nor B

C) Both A and B

58) Which of the following is a factor that has contributed to the popularity of cloud computing? A) The Internet. B) Web services. C) Both A and B D) Neither A nor B

C) Both A and B

65) SOAs are attractive because of ________ A) reuse B) language independence C) Both A and B D) Neither A nor B

C) Both A and B

67) In SOA, what language can be used to create service objects? A) Java. B) C++. C) Both A and B D) Neither A nor B

C) Both A and B

75) Which of the following is true? A) A Web service is one way to implement a SOA. B) SOAP is one way to implement a Web service. C) Both A and B D) Neither A nor B

C) Both A and B

87) Which of the following is a security risk associated with BitTorrent? A) Danger caused by opening TCP ports on the firewall. B) Danger that an employee may download an infected file. C) Both A and B D) Neither A nor B

C) Both A and B

89) Skype offers ________. A) free calling among Skype customers B) reduced-cost calling to and from Public Switched Telephone Network customers C) Both A and B D) Neither A nor B

C) Both A and B

95) Which of the following steps in Skype is done P2P? A) Signaling. B) Transport. C) Both A and B D) Neither A nor B

C) Both A and B

6) In client/server processing, processing is done on the ________. A) client B) server C) On both of the above. D) host computer

C) On both of the above.

Tor provides confidentiality ________. A) all the way to the destination host B) up to the entry P2P node C) up to the exit P2P node D) Tor does not provide confidentiality.

C) up to the exit P2P node

38) How many HTTP request-response cycles are needed to transfer a webpage containing three graphics images? A) 1. B) 2. C) 3. D) 4. E) None of the above.

D) 4.

48) Which of the following is an attraction of cloud SaaS? A) Potential lowered costs in hardware and personnel. B) Mobility. C) Collaboration. D) All of the above.

D) All of the above.

43) ________ is a standard to describe a file's format type. A) RFC 2822 B) SMTP C) HTML D) MIME

D) MIME

96) Login is done P2P (instead of using servers) in ________. A) Skype B) traditional VoIP C) Both A and B D) Neither A nor B

D) Neither A nor B

98) Transport is done using servers (not P2P) in ________. A) Skype B) traditional VoIP C) Both A and B D) Neither A nor B

D) Neither A nor B

What is the almost universal standard for end-to-end encryption? A) SSL/TLS B) IPsec C) PGP D) There is no almost universal standard for end-to-end encryption.

D) There is no almost universal standard for end-to-end encryption.

74) The purpose of ________ is to help someone to find an appropriate service object. A) SOAP B) XML C) WDSL D) UDDI

D) UDDI

9) E-mail bodies that have non-English text use ________. A) RFC 822 and RFC 2822 B) HTTP C) MIME D) UNICODE E) None of the above.

D) UNICODE

1) The way in which application layer functions are spread among computers to deliver service to users is called ________. A) distributed processing B) peer-to-peer computing C) client/server computing D) an application architecture E) Both b. and c.

D) an application architecture

In XSS, the malicious script that gets placed in a webpage sent to a target is ________. A) created by a Trojan horse B) sent by someone who has compromised the webserver C) embedded in a database the user queries D) sent by a user

D) sent by a user Explanation: The explosion in mobile apps makes vetting applications very difficult.

64) In SOA, calls are placed to ________. A) programs B) subprograms C) subroutines D) service objects

D) service objects

11) An e-mail user sending messages to his or her mail server would most likely use ________. A) the IMAP standard B) the POP standard C) either the IMAP or POP standard D) the SMTP standard E) RFC 2822

D) the SMTP standard

49) Which of the following is not an issue for cloud Software as a Service? A) The possibility of losing access. B) The possibility of getting locked into proprietary software. C) Security concerns. D) Legal complications. E) All of the above are issues for cloud Software as a Service.

E) All of the above are issues for cloud Software as a Service.

56) Which of the following is not an issue for cloud utility computing? A) The possibility of losing access. B) The possibility of getting locked into proprietary software. C) Security concerns. D) Legal complications. E) All of the above are issues for cloud utility computing.

E) All of the above are issues for cloud utility computing.

12) Mail servers communicate with each other by using ________. A) POP B) IMAP C) either POP or IMAP D) RFC 2822 E) SMTP

E) SMTP

31) Variable time delays between successive packets in a transport stream is called ________. A) a timing error B) a warble C) RTP D) a SIP violation E) jitter

E) jitter


संबंधित स्टडी सेट्स

ISDS final: the internet, web, and electronic commerce

View Set

Chapter 8: Assessing a New Venture's Financial Strength and Viability

View Set

Chapter 17: Understanding Accounting and Financial Information

View Set

Comparative Government Final (India)

View Set