CPSC 353 Chapter 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

For data, NVT uses US ASCII characters with the highest order bit set to ______.

0

For control, NVT uses US ASCII characters with the highest order bit set to ______.

1

________ provides service to the user to make the process of sending or receiving a message easier.

A UA

In the domain name space, if a label is terminated by a null string, it is called a __________.

FQDN (none of the above on test)

Which of the following is not a Chord interface.

Fix node

A registrar, a commercial entity accredited by ________ is responsible for adding new domains to DNS data base

ICANN

In ________, nodes and data items are m-bit identifiers that create an identifier space of 2m points distributed at the leaves of a binary tree

Kademlia

Trackerless BitTorrent uses __________ DHT to do the job of tracking.

Kademlia

________ is a supplementary protocol that allows non-ASCII data to be sent through e-mail.

MIME

In the domain name space, if a label is not terminated by a null string, it is called a __________.

PQDN

In __________ a key is stored in a node whose identifier is numerically closest to the key.

Pastry

To resolve a query, _________ uses two entities: a routing table and a leaf set

Pastry

The formal protocol that defines the MTA client and server in the Internet is called ___________.

SMTP

The _________ component in the SSH provides confidentiality, integrity, authentication and compression.

SSH-TRAN

FTP uses the services of ________.

TCP

HTTP uses the services of _________.

TCP

The _______ translates local characters into NVT characters.

TELNET client

The _______ translates NVT characters into a form acceptable by the remote operating system.

TELNET server

_____________ is a language for creating a static document.

XSL, HTML, XML

In a structured-decentralized P2P network, ________________.

a pre-defined set of rules is used to link nodes so that a query can be effectively and efficiently resolved

In HTTP, _______ server is a computer that keeps copies of responses to recent requests.

a proxy

An HTTP request message always contains _______.

a request line and a header line

Port forwarding in SSH is ____________________________.

a service (provided by SSH, that creates a secure channel for applications that do not have security services.)

The root of the DNS tree is _______.

a string of 15 characters

For many applications, we need a program or a script to be run at the client site. These are called _______________ documents.

active

In the DNS, the names are defined in ___________ structure.

an inverted-tree

During an FTP session the data connection may be opened _______.

as many times as needed

In the _______ encoding scheme, each 24 bits become four 6-bit chunks, and eventually are sent as 32 bits.

base64

Napster is an example of a ____________ peer-to-peer network

centralized

In a centralized P2P network, the directory system uses the ________ paradigm; the storing and downloading of the files are done using __________ paradigm.

client-server; peer-to-peer

In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _______.

data structures

Network Virtual Terminal (NVT) uses two sets of characters, one for _____ and one for __________.

data; control

In Kademlia, each node in the network divides the binary tree into m subtrees that _______

do not include the node itself

In the domain name space, a _________ is a subtree of the domain name space.

domain

In the domain name space, a full domain name is a sequence of labels separated by ________.

dots

A _______ document is created by a Web server whenever a browser requests the document.

dynamic

DNS can use the services of ________.

either UDP or TCP

In FTP, ASCII, EBCDIC, and image define an attribute called _______.

file type

In a _______ name space, a name is a sequence of characters without structure.

flat

In a DHT-based network, each peer

has a partial knowledge about the whole network.

An e-mail message contains the ________ and the __________.

header; body

In a _________ name space, each name is made of several parts.

hierarchical

In __________ resolution, the server returns the IP address of the server that it thinks can resolve the query.

iterative

When a user logs into a local time-sharing system, it is called ________ login.

local

In the Internet, an e-mail address consists of two parts: a _______ and a _______.

local part; domain name

In Kademlia, the distance between the two identifiers (nodes or keys) are measured as the bitwise-___________ between them.

none of the above

The finger table is the routing table used in ______________.

none of the above

In a ___________ connection, one TCP connection is made for each request/response.

nonpersistent

During an FTP session the control connection is opened _______.

once

In a ___________ connection, the server leaves the connection open for more requests after sending a response.

persistent

A ________ server is a computer that stores a file about the zone for which it has an authority.

primary

The first section of a URL identifier is the __________.

protocol

The message access protocol is a ________ protocol.

pull

SMTP is a __________ protocol.

push

In the _______ encoding scheme, a non-ASCII character is sent as 3 characters.

quoted-printable

In __________ resolution, the resolver expects the server to supply the final answer.

recursive

When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login.

remote

In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line.

request line; status line (none of the above on test)

A _______ server is a computer whose zone system consists of the whole tree.

root

A ________ server is a computer that transfers the complete information about a zone from another server.

secondary

In a client-server paradigm, a _______ program provides services to a (another) _______ program.

server; client

A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only.

static

In FTP, when we _______, it is copied from the client to the server.

store a file

BitTorrent is an example of a ____________ peer-to-peer network

structured-decentralized

TELNET is an abbreviation for ____________.

terminal network

In a client-server paradigm ____________________________

the server must be running all the time but the client needs to be running only when it is needed.

In FTP, there are three types of _______: stream, block, and compressed.

transmission modes

In FTP, _________ well-known port(s) is (are) used.

two

In the common scenario, the electronic mail system needs _________________________.

two UAs, two pairs of MTAs and a pair of MAAs

In the Internet, the country domain section uses ___________ country abbreviations.

two-character

Gnutella is an example of a ____________ peer-to-peer network

unstructured-decentralized

Which of the following is present in both an HTTP request line and a status line?

version number

In the domain name space, what a server is responsible for or has authority over is called a _________.

zone


Set pelajaran terkait

Chapter 22, Penal Code, Texas Criminal ands traffic Law

View Set

Leccion 4 Clasificar Choose the best category for each word and phrase.

View Set

AP Biology Practice Multiple Choice

View Set

Dynamic Business Law Exam 1 (quiz questions)

View Set