Chapter 2
static
A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only.
dynamic
A _______ document is created by a Web server whenever a browser requests the document.
root
A _______ server is a computer whose zone system consists of the whole tree.
primary
A ________ server is a computer that stores a file about the zone for which it has an authority.
secondary
A ________ server is a computer that transfers the complete information about a zone from another server.
ICANN
A registrar, a commercial entity accredited by ________ is responsible for adding new domains to DNS data base
a request line and a header line
An HTTP request message always contains _______.
header; body
An e-mail message contains the ________ and the __________.
structured-decentralized
BitTorrent is an example of a ____________ peer-to-peer network
either UDP or TCP
DNS can use the services of ________.
once
During an FTP session the control connection is opened _______.
as many times as needed
During an FTP session the data connection may be opened _______.
TCP
FTP uses the services of ________.
1
For control, NVT uses US ASCII characters with the highest order bit set to ______.
0
For data, NVT uses US ASCII characters with the highest order bit set to ______.
active
For many applications, we need a program or a script to be run at the client site. These are called _______________ documents.
unstructured-decentralized
Gnutella is an example of a ____________ peer-to-peer network
TCP
HTTP uses the services of _________.
file type
In FTP, ASCII, EBCDIC, and image define an attribute called _______.
two
In FTP, _________ well-known port(s) is (are) used.
data structures
In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _______.
transmission modes
In FTP, there are three types of _______: stream, block, and compressed.
store a file
In FTP, when we _______, it is copied from the client to the server.
a proxy
In HTTP, _______ server is a computer that keeps copies of responses to recent requests.
request line; status line (none of the above on test)
In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line.
do not include the node itself
In Kademlia, each node in the network divides the binary tree into m subtrees that _______
none of the above
In Kademlia, the distance between the two identifiers (nodes or keys) are measured as the bitwise-___________ between them.
Kademlia
In ________, nodes and data items are m-bit identifiers that create an identifier space of 2m points distributed at the leaves of a binary tree
Pastry
In __________ a key is stored in a node whose identifier is numerically closest to the key.
recursive
In __________ resolution, the resolver expects the server to supply the final answer.
iterative
In __________ resolution, the server returns the IP address of the server that it thinks can resolve the query.
has a partial knowledge about the whole network.
In a DHT-based network, each peer
flat
In a _______ name space, a name is a sequence of characters without structure.
hierarchical
In a _________ name space, each name is made of several parts.
nonpersistent
In a ___________ connection, one TCP connection is made for each request/response.
persistent
In a ___________ connection, the server leaves the connection open for more requests after sending a response.
client-server; peer-to-peer
In a centralized P2P network, the directory system uses the ________ paradigm; the storing and downloading of the files are done using the __________ paradigm.
the server must be running all the time but the client needs to be running only when it is needed
In a client-server paradigm ____________________________.
server; client
In a client-server paradigm, a _______ program provides services to a (another) _______ program.
a pre-defined set of rules is used to link nodes so that a query can be effectively and efficiently resolved
In a structured-decentralized P2P network, ________________.
an inverted-tree
In the DNS, the names are defined in ___________ structure.
local part; domain name
In the Internet, an e-mail address consists of two parts: a _______ and a _______.
two-character
In the Internet, the country domain section uses ___________ country abbreviations.
quoted-printable
In the _______ encoding scheme, a non-ASCII character is sent as 3 characters.
base64
In the _______ encoding scheme, each 24 bits become four 6-bit chunks, and eventually are sent as 32 bits.
two UAs, two pairs of MTAs and a pair of MAAs
In the common scenario, the electronic mail system needs _________________________.
domain
In the domain name space, a _________ is a subtree of the domain name space.
dots
In the domain name space, a full domain name is a sequence of labels separated by ________.
PQDN
In the domain name space, if a label is not terminated by a null string, it is called a __________.
FQDN (none of the above on test)
In the domain name space, if a label is terminated by a null string, it is called a __________.
zone
In the domain name space, what a server is responsible for or has authority over is called a _________.
centralized
Napster is an example of a ____________ peer-to-peer network
data; control
Network Virtual Terminal (NVT) uses two sets of characters, one for _____ and one for __________.
a service (provided by SSH, that creates a secure channel for applications that do not have security services.)
Port forwarding in SSH is ____________________________.
push
SMTP is a __________ protocol.
terminal network
TELNET is an abbreviation for ____________.
TELNET server
The _______ translates NVT characters into a form acceptable by the remote operating system.
TELNET client
The _______ translates local characters into NVT characters.
SSH-TRAN
The _________ component in the SSH provides confidentiality, integrity, authentication and compression.
none of the above
The finger table is the routing table used in ______________.
protocol
The first section of a URL identifier is the __________.
SMTP
The formal protocol that defines the MTA client and server in the Internet is called ___________.
pull
The message access protocol is a ________ protocol.
a string of 15 characters
The root of the DNS tree is _______.
Pastry
To resolve a query, _________ uses two entities: a routing table and a leaf set
Kademlia
Trackerless BitTorrent uses __________ DHT to do the job of tracking.
local
When a user logs into a local time-sharing system, it is called ________ login.
remote
When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login.
Fix node
Which of the following is not a Chord interface.
version number
Which of the following is present in both an HTTP request line and a status line?
MIME
________ is a supplementary protocol that allows non-ASCII data to be sent through e-mail.
A UA
________ provides service to the user to make the process of sending or receiving a message easier.
XSL, HTML, XML
_____________ is a language for creating a static document.