CPSC 353 Chapter 2
For data, NVT uses US ASCII characters with the highest order bit set to ______.
0
For control, NVT uses US ASCII characters with the highest order bit set to ______.
1
________ provides service to the user to make the process of sending or receiving a message easier.
A UA
In the domain name space, if a label is terminated by a null string, it is called a __________.
FQDN (none of the above on test)
Which of the following is not a Chord interface.
Fix node
A registrar, a commercial entity accredited by ________ is responsible for adding new domains to DNS data base
ICANN
In ________, nodes and data items are m-bit identifiers that create an identifier space of 2m points distributed at the leaves of a binary tree
Kademlia
Trackerless BitTorrent uses __________ DHT to do the job of tracking.
Kademlia
________ is a supplementary protocol that allows non-ASCII data to be sent through e-mail.
MIME
In the domain name space, if a label is not terminated by a null string, it is called a __________.
PQDN
In __________ a key is stored in a node whose identifier is numerically closest to the key.
Pastry
To resolve a query, _________ uses two entities: a routing table and a leaf set
Pastry
The formal protocol that defines the MTA client and server in the Internet is called ___________.
SMTP
The _________ component in the SSH provides confidentiality, integrity, authentication and compression.
SSH-TRAN
FTP uses the services of ________.
TCP
HTTP uses the services of _________.
TCP
The _______ translates local characters into NVT characters.
TELNET client
The _______ translates NVT characters into a form acceptable by the remote operating system.
TELNET server
_____________ is a language for creating a static document.
XSL, HTML, XML
In a structured-decentralized P2P network, ________________.
a pre-defined set of rules is used to link nodes so that a query can be effectively and efficiently resolved
In HTTP, _______ server is a computer that keeps copies of responses to recent requests.
a proxy
An HTTP request message always contains _______.
a request line and a header line
Port forwarding in SSH is ____________________________.
a service (provided by SSH, that creates a secure channel for applications that do not have security services.)
The root of the DNS tree is _______.
a string of 15 characters
For many applications, we need a program or a script to be run at the client site. These are called _______________ documents.
active
In the DNS, the names are defined in ___________ structure.
an inverted-tree
During an FTP session the data connection may be opened _______.
as many times as needed
In the _______ encoding scheme, each 24 bits become four 6-bit chunks, and eventually are sent as 32 bits.
base64
Napster is an example of a ____________ peer-to-peer network
centralized
In a centralized P2P network, the directory system uses the ________ paradigm; the storing and downloading of the files are done using __________ paradigm.
client-server; peer-to-peer
In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _______.
data structures
Network Virtual Terminal (NVT) uses two sets of characters, one for _____ and one for __________.
data; control
In Kademlia, each node in the network divides the binary tree into m subtrees that _______
do not include the node itself
In the domain name space, a _________ is a subtree of the domain name space.
domain
In the domain name space, a full domain name is a sequence of labels separated by ________.
dots
A _______ document is created by a Web server whenever a browser requests the document.
dynamic
DNS can use the services of ________.
either UDP or TCP
In FTP, ASCII, EBCDIC, and image define an attribute called _______.
file type
In a _______ name space, a name is a sequence of characters without structure.
flat
In a DHT-based network, each peer
has a partial knowledge about the whole network.
An e-mail message contains the ________ and the __________.
header; body
In a _________ name space, each name is made of several parts.
hierarchical
In __________ resolution, the server returns the IP address of the server that it thinks can resolve the query.
iterative
When a user logs into a local time-sharing system, it is called ________ login.
local
In the Internet, an e-mail address consists of two parts: a _______ and a _______.
local part; domain name
In Kademlia, the distance between the two identifiers (nodes or keys) are measured as the bitwise-___________ between them.
none of the above
The finger table is the routing table used in ______________.
none of the above
In a ___________ connection, one TCP connection is made for each request/response.
nonpersistent
During an FTP session the control connection is opened _______.
once
In a ___________ connection, the server leaves the connection open for more requests after sending a response.
persistent
A ________ server is a computer that stores a file about the zone for which it has an authority.
primary
The first section of a URL identifier is the __________.
protocol
The message access protocol is a ________ protocol.
pull
SMTP is a __________ protocol.
push
In the _______ encoding scheme, a non-ASCII character is sent as 3 characters.
quoted-printable
In __________ resolution, the resolver expects the server to supply the final answer.
recursive
When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login.
remote
In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line.
request line; status line (none of the above on test)
A _______ server is a computer whose zone system consists of the whole tree.
root
A ________ server is a computer that transfers the complete information about a zone from another server.
secondary
In a client-server paradigm, a _______ program provides services to a (another) _______ program.
server; client
A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only.
static
In FTP, when we _______, it is copied from the client to the server.
store a file
BitTorrent is an example of a ____________ peer-to-peer network
structured-decentralized
TELNET is an abbreviation for ____________.
terminal network
In a client-server paradigm ____________________________
the server must be running all the time but the client needs to be running only when it is needed.
In FTP, there are three types of _______: stream, block, and compressed.
transmission modes
In FTP, _________ well-known port(s) is (are) used.
two
In the common scenario, the electronic mail system needs _________________________.
two UAs, two pairs of MTAs and a pair of MAAs
In the Internet, the country domain section uses ___________ country abbreviations.
two-character
Gnutella is an example of a ____________ peer-to-peer network
unstructured-decentralized
Which of the following is present in both an HTTP request line and a status line?
version number
In the domain name space, what a server is responsible for or has authority over is called a _________.
zone