Chapter 11

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

According to the principle of defense in depth, antivirus filtering should be done in at least ________ location(s). A. 1 B. 2 C. 3 D. 4

B

For the transport layer, VoIP uses ________ for transport transmission. A. TCP B. UDP C. codec standards D. IP

B

In BitTorrent, the group of all connected computers that have all or part of the file to be downloaded is called the ________. A. swarm B. index C. tracker D. none of the above

A

In HTTP, keywords usually are followed by a ________. A. colon (:) B. carriage return/line feed C. blank line D. space

A

In ________, a company offloads server processing work to another company at a remote site. A. utility computing B. software as a service C. none of the above

A

In cloud ________, the user accesses the software over the Internet, often with a browser. A. SaaS B. utility computing

A

SIP is a ________ protocol for VoIP. A. signaling B. transport C. both A and B D. neither A nor B

A

The main advantage of ________ file sharing is that it brings cost savings by using clients rather than server processing power. A. BitTorrent B. client/server C. both A and B D. neither A nor B

A

Transient client presence tends to be a problem in ________. A. P2P applications B. client/server applications C. both A and B D. neither A nor B

A

Users are primarily concerned about the ________ layer. A. application B. transport C. internet D. physical

A

Which of the following is an attraction of cloud utility computing? A. flexibility B. control over operations C. both A and B D. neither A nor B

A

Which of the following is considered a bigger problem with traditional client/server based architectures than with peer-to-peer architectures? A. underutilized processing capacity of client PCs B. potential for essential data/services to become unavailable as a device is turned off C. both A and B D. neither A nor B

A

Which of the following is likely to dominate in VoIP? A. SIP B. H.323

A

Which of the following is used to retrieve Web pages? A. HTTP B. HTML C. RTP D. SQL

A

Which of the following steps in Skype is done P2P? A. most signaling B. transport C. both A and B D. neither A nor B

A

________ use ________ that provide services to customers using WWW interaction standards. A. Web services, service objects B. Service objects, web services

A

How many HTTP request-response cycles are needed to transfer a webpage containing 88 lines of text and three different images? A. 3 B. 4 C. 88 D. 91

B

If you are using a Web-enabled e-mail system ________. A. you have to install a special Web-enabled e-mail client to access your e-mail B. you access and send mail by using a Web browser C. you are more likely to be susceptible to viruses being introduced on your computer D. you are unable to send/receive e-mail messages containing information other than letters or numbers

B

In BitTorrent, a(n) ________ website is a site the BitTorrent client program goes to in order to get .torrent files. A. swarm B. index C. tracker D. none of the above

B

In HTTP, fields normally are ended by a ________. A. colon (:) B. carriage return/line feed C. blank line D. space

B

In SOA, SOAP messages are encoded in ________. A. HTML B. XML C. both A and B D. neither A nor B

B

In ________ file retrieval, your computer downloads a file from a server. A. P2P B. client/server C. BitTorrent D. none of the above

B

In virtualization, the real computer's capacity is divided among a number of ________. A. hypervisors B. virtual machines C. neither A nor B

B

RTP supports ________. A. faster transmission speed B. jitter control C. both A and B D. neither A nor B

B

Signaling is done using servers (not P2P) in ________. A. Skype B. traditional VoIP C. both A and B D. neither A nor B

B

The Skype protocol is relatively ________ for corporate firewalls to filter. A. easy B. difficult

B

The advance that made the client/server application architecture possible was ________. A. the Internet B. client processing power C. application sophistication D. input/output methods

B

The code "200" may be found in HTTP ________ messages. A. request B. response C. both A and B D. neither A nor B

B

VoIP users have ________ in their phones or on their computers. A. media gateways B. codecs C. both A and B D. neither A nor B

B

Which header comes SECOND in a VoIP transport packet? A. RTP B. UDP C. TCP D. Application

B

Which of the following allows you to read your e-mail easily on an Internet cafe's computer? A. POP B. Web-enabled e-mail C. both A and B D. neither A nor B

B

Which of the following is a processor-sharing application? A. BitTorrent B. SETI@home C. SIP D. Skype

B

Which of the following is not one of the main elements of the Skype network? A. login server B. proxy server C. host node D. super node

B

Which of the following is used in webpage bodies? A. HTTP B. HTML C. both A and B D. neither A nor B

B

Which of the following offers more reliable antivirus protection? A. antivirus software on user PCs B. antivirus software on the mail server C. Both A and B are about equally reliable.

B

Which of the following steps in Skype is done P2P? A. login B. signaling C. both A and B D. neither A nor B

B

Antivirus software checks e-mail attachments for ________. A. viruses B. Trojan horses C. both A and B D. neither A nor B

C

Having all privileges on a computer is known as having ________. A. all access B. total control C. root privileges D. all of the above

C

If a company runs its own data center, it might face problems with ________. A. overprovisioning B. underprovisioning C. both A and B D. neither A nor B

C

If most P2P applications use facilitating servers, why do we still call them peer-to-peer? A. We accept sloppy terminology. B. We do NOT still call them peer-to-peer. C. User computers do most of the work. D. P2P applications do NOT use servers.

C

In BitTorrent, a(n) ________ is a server that coordinates the file transfer. A. swarm B. index C. tracker D. none of the above

C

In HTTP response messages, the attached file is preceded by a ________. A. colon (:) B. space C. blank line D. any of the above

C

In SOA, what language can be used to create service objects? A. Java B. C++ C. both A and B D. neither A nor B

C

SOAs are attractive because of ________. A. reuse B. language independence C. both A and B D. neither A nor B

C

SaaS software vendors may make an application available by ________. A. hosting it on their own webservers B. allowing the application to be downloaded to the consumer device C. both A and B D. neither A nor B

C

Skype offers ________. A. free calling among Skype customers B. free calling to and from Public Switched Telephone Network customers C. both A and B D. neither A nor B

C

Speech codecs vary with respect to ________. A. compression B. voice quality C. both A and B D. neither A nor B

C

The purpose of ________ is to help someone to find an appropriate service object. A. SOAP B. XML C. WSDL D. UDDI

C

Which element of the Skype network is in charge of signaling? A. the login server B. host nodes C. super nodes D. media gateways

C

Which element of the Skype network is in charge of transport? A. the login server B. the calling and called host nodes C. super nodes D. media gateways

C

Which of the following is a factor that has contributed to the popularity of cloud computing? A. the Internet B. web services C. both A and B D. neither A nor B

C

Which of the following is a security risk associated with BitTorrent? A. danger caused by opening TCP ports on the firewall B. danger that an employee may download an infected file C. both A and B D. neither A nor B

C

Which of the following is true? A. A Web service is one way to implement a SOA. B. SOAP is one way to implement a Web service. C. both A and B D. neither A nor B

C

A traditional e-mail user sending messages to his or her mail server would most likely use ________. A. the IMAP standard B. the POP standard C. either the IMAP or POP standard D. the SMTP standard

D

E-mail bodies that have non-English text use ________. A. RFC 822 and RFC 2822 B. HTTP C. POP D. UNICODE

D

How many HTTP request-response cycles are needed to transfer a webpage containing three graphics images? A. 1 B. 2 C. 3 D. none of the above

D

In SOA, calls are placed to ________. A. programs B. subprograms C. subroutines D. service objects

D

Login is done P2P (instead of using servers) in ________. A. Skype B. traditional VoIP C. both A and B D. neither A nor B

D

Mail servers communicate with each other by using ________. A. POP B. HTTP C. RFC 2822 D. SMTP

D

The way in which application layer functions are spread among computers to deliver service to users is called ________. A. distributed processing B. peer-to-peer computing C. client/server computing D. an application architecture

D

Transport is done using servers (not P2P) in ________. A. Skype B. traditional VoIP C. both A and B D. neither A nor B

D

Variability in time delays between successive packets in a transport stream is called ________. A. a timing error B. a warble C. a SIP violation D. jitter

D

Which of the following is an attraction of cloud SaaS? A. potential lowered costs in hardware and personnel B. mobility C. collaboration D. all of the above

D

Which of the following is not an issue for cloud Software as a Service? A. the possibility of losing access B. the possibility of getting locked into proprietary software C. security concerns D. All of the above are issues for cloud Software as a Service.

D

Which of the following is not an issue for cloud utility computing? A. the possibility of losing access B. the possibility of getting locked into proprietary software C. security concerns D. All of the above are issues for cloud utility computing.

D

________ is a standard to describe a file's format type. A. RFC 2822 B. SMTP C. HTML D. MIME

D

Which of the following is not an issue for cloud utility computing? A. the possibility of losing access B. the possibility of getting locked into proprietary software C. very high costs D. security concerns E. none of the above

E


Set pelajaran terkait

Sociology of Sport Mid-Term Study Guide - Richardson

View Set

Civil Rights Movement - Chronological

View Set

Chapter 3: Analyzing Business Transactions Using T Accounts, Review

View Set