CPSC353 Chapter 1, CPSC353 Chapter 2, CPSC353 Chapter 3

Ace your homework & exams now with Quizwiz!

For control, NVT uses US ASCII characters with the highest order bit set to ______. A) 1 B) 0 C) 1 or 0 D) None of the choices are correct

A) 1

The formal protocol that defines the MTA client and server in the Internet is called ___________. A) SMTP B) SNMP C) TELNET D) SSH

A) SMTP

The application layer in the TCP/IP protocol suite is usually considered to be the combination of ________ layers in the OSI model A) application, presentation, and session B) application, transport, and network C) application, data-link, and physical D) network, data-link, and physical

A) application, presentation, and session

Napster is an example of a ____________ peer-to-peer network A) centralized B) structured-decentralized C) unstructured-decentralized D) None of the choices are correct

A) centralized

In FTP, ASCII, EBCDIC, and image define an attribute called _______. A) file type B) data structure C) transmission mode D) none of the choices are correct

A) file type

In a DHT-based network, each peer A) has a partial knowledge about the whole network. B) has a complete knowledge about the whole network. C) only has a knowledge about its successor. D) None of the choices are correct

A) has a partial knowledge about the whole network.

In the original ARPANET, _______ were directly connected to each other. A) interface message processors (IMPs). B) host computers C) networks D) routers

A) interface message processors (IMPs).

In __________ resolution, the server returns the IP address of the server that it thinks can resolve the query. A) iterative B) recursive C) straight D) None of the choices are correct

A) iterative

When a user logs into a local time-sharing system, it is called ________ login. A) local B) remote C) local or remote D) None of the choices are correct

A) local

In the Internet, an e-mail address consists of two parts: a _______ and a _______. A) local part; domain name B) global part; domain name C) label; domain name D) local part; label

A) local part; domain name

In TCP/IP, a logical connection between an entity at the network layer can be made with another entity at the ________ layer. A) network B) transport C) data link D) physical

A) network

In TCP/IP, a message at the transport layer is encapsulated in a packet at the ________ layer. A) network B) transport C) data link D) physical

A) network

In TCP/IP, a message belonging to the transport layer is decapsulated from a packet at the ________ layer. A) network B) transport C) data link D) physical

A) network

In the TCP/IP protocol suite, a logical address is the identifier at the _______________. A) network layer B) transport layer C) data-link layer D) application layer

A) network layer

During an FTP session the control connection is opened _______. A) once B) twice C) many times D) none of the choices are correct

A) once

In a ___________ connection, the server leaves the connection open for more requests after sending a response. A) persistent B) nonpersistent C) persistent or nonpersistent D) None of the choices are correct

A) persistent

A ________ server is a computer that stores a file about the zone for which it has an authority. A) primary B) secondary C) zone D) root

A) primary

The first section of a URL identifier is the __________. A) protocol B) path C) host D) port

A) protocol

The message access protocol is a ________ protocol. A) pull B) push C) push and pull D) None of the choices are correct

A) pull

An RFC is labeled ________ if it must be implemented by all Internet systems. A) required B) elective C) recommended D) None of the choices are correct

A) required

A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only. A) static B) dynamic C) active D) None of the choices are correct

A) static

TELNET is an abbreviation for ____________. A) terminal network B) telephone network C) telecommunication network D) None of the choices are correct

A) terminal network

In the Internet, the country domain section uses ___________ country abbreviations. A) two-character B) three-character C) four-character D) None of the choices are correct

A) two-character

Which of the following is present in both an HTTP request line and a status line? A) version number B) URL C) status code D) method

A) version number

For data, NVT uses US ASCII characters with the highest order bit set to ______. A) 1 B) 0 C) 1 or 0 D) None of the choices are correct

B) 0

_______ was formed to connect universities with no defense ties. A) ARPANET B) CSNET C) NSFNET D) ANSNET

B) CSNET

Which of the following is not a Chord interface. A) Lookup B) Fix node C) Stabilize D) Join

B) Fix node

A registrar, a commercial entity accredited by ________ is responsible for adding new domains to DNS data base A) NIC B) ICANN C) ISOC D) IEFE

B) ICANN

Currently _______ is responsible for the management of Internet domain names and addresses A) NIC B) ICANN C) ISOC D) IEFE

B) ICANN

In the domain name space, if a label is not terminated by a null string, it is called a __________. A) FQDN B) PQDN C) SQDN D) None of the choices are correct

B) PQDN

In __________ a key is stored in a node whose identifier is numerically closest to the key. A) Chord B) Pastry C) Kademlia D) None of the choices are correct

B) Pastry

To resolve a query, _________ uses two entities: a routing table and a leaf set. A) Chord B) Pastry C) Kademlia D) None of the choices are correct

B) Pastry

The _______ translates local characters into NVT characters. A) terminal driver B) TELNET client C) TELNET server D) pseudoterminal driver

B) TELNET client

In HTTP, _______ server is a computer that keeps copies of responses to recent requests. A) a regular B) a proxy C) an auxiliary D) a remote

B) a proxy

An HTTP request message always contains _______. A) a header line and a body B) a request line and a header line C) a request line, a header line, and a body D) a request line, a header line, a blank line, and a body

B) a request line and a header line

In the DNS, the names are defined in ___________ structure. A) a linear list B) an inverted-tree C) a three-dimensional D) None of the choices are correct

B) an inverted-tree

In the TCP/IP protocol suite, the ______ layer is responsible for moving frames from one hop (node) to the next. A) physical B) data link C) transport D) network

B) data link

In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _______. A) file types B) data structures C) transmission modes D) none of the choices are correct

B) data structures

In Kademlia, each node in the network divides the binary tree into m subtrees that. A) include the node itself B) do not include the node itself C) include the node itself and the successor node D) None of the choices are correct

B) do not include the node itself

A _______ document is created by a Web server whenever a browser requests the document. A) static B) dynamic C) active D) None of the choices are correct

B) dynamic

In a _______ name space, a name is a sequence of characters without structure. A) linear B) flat C) hierarchical D) organized

B) flat

An e-mail message contains the ________ and the __________. A) header; envelop B) header; body C) envelop; body D) None of the choices are correct

B) header; body

In a ___________ connection, one TCP connection is made for each request/response. A) persistent B) nonpersistent C) persistent or a nonpersistent D) None of the choices are correct

B) nonpersistent

SMTP is a __________ protocol. A) pull B) push C) push and pull D) None of the choices are correct

B) push

In __________ resolution, the resolver expects the server to supply the final answer. A) iterative B) recursive C) straight D) None of the choices are correct

B) recursive

When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login. A) local B) remote C) local or remote D) None of the choices are correct

B) remote

A ________ server is a computer that transfers the complete information about a zone from another server. A) primary B) secondary C) zone D) root

B) secondary

In FTP, when we _______, it is copied from the client to the server. A) retrieve a file B) store a file C) open a file D) none of the choices are correct

B) store a file

BitTorrent is an example of a ____________ peer-to-peer network A) centralized B) structured-decentralized C) unstructured-decentralized D) None of the choices are correct

B) structured-decentralized

In TCP/IP, a message at the application layer is encapsulated in a packet at the ________ layer. A) network B) transport C) data link D) physical

B) transport

The _________ layer is responsible for the delivery of a message from one process to another. A) physical B) transport C) network D) application

B) transport

In the TCP/IP protocol suite, a port number is the identifier at the ____________. A) application layer B) transport layer C) network layer D) physical layer

B) transport layer

In FTP, _________ well-known port(s) is (are) used. A) one B) two C) three D) four

B) two

________ provides service to the user to make the process of sending or receiving a message easier. A) An MTA B) An MAA C) A UA D) None of the choices are correct

C) A UA

In ________, nodes and data items are m-bit identifiers that create an identifier space of 2m points distributed at the leaves of a binary tree A) Chord B) Pastry C) Kademlia D) None of the choices are correct

C) Kademlia

________ is a supplementary protocol that allows non-ASCII data to be sent through e-mail. A) SMPT B) MPEG C) MIME D) POP

C) MIME

FTP uses the services of ________. A) UDP B) IP C) TCP D) none of the choices are correct

C) TCP

HTTP uses the services of _________. A) UDP B) IP C) TCP D) DNS

C) TCP

The _______ translates NVT characters into a form acceptable by the remote operating system. A) terminal driver B) TELNET client C) TELNET server D) pseudoterminal driver

C) TELNET server

In the TCP/IP protocol suite, which of the following is a network layer protocol? A) The Stream Control Transmission Protocol (SCTP) B) The Secure Shell (SSH) C) The Internet Protocol (IP) D) User Datagram Protocol (UDP)

C) The Internet Protocol (IP)

In a structured-decentralized P2P network, ________________. A) the directory system is kept in a center B) a query to find a file must be flooded through the network C) a pre-defined set of rules is used to link nodes so that a query can be effectively and efficiently resolved D) None of the choices are correct

C) a pre-defined set of rules is used to link nodes so that a query can be effectively and efficiently resolved

The transport-layer packet in the TCP/IP protocol suite is called A) a message B) a datagram C) a segment or a user datagram D) a frame

C) a segment or a user datagram

Port forwarding is ____________________________. A) a protocol used to forward messages from one port to another port B) a procedure for changing an ephemeral port to a well-known port C) a service, provided by SSH, that creates a secure channel for applications that do not have security services. D) None of the choices are correct

C) a service, provided by SSH, that creates a secure channel for applications that do not have security services.

The root of the DNS tree is _______. A) a string of 127 characters B) a string of 63 characters C) a string of 15 characters D) an empty string

C) a string of 15 characters

For many applications, we need a program or a script to be run at the client site. These are called _______________ documents. A) static B) dynamic C) active D) None of the choices are correct

C) active

During an FTP session the data connection may be opened _______. A) only once B) only two times C) as many times as needed D) none of the choices are correct

C) as many times as needed

In the _______ encoding scheme, each 24 bits become four 6-bit chunks, and eventually are sent as 32 bits. A) 8bit B) binary C) base64 D) quoted-printable

C) base64

In a centralized P2P network, the directory system uses the ________ paradigm; the storing and downloading of the files are done using __________ paradigm. A) client-server; client-server B) peer-to-peer; client-server C) client-server; peer-to-peer D) peer-to-peer; peer-to-peer

C) client-server; peer-to-peer

In TCP/IP, a logical connection between an entity at the data-link layer can be made with another entity at the ________ layer. A) network B) transport C) data link D) physical

C) data link

In TCP/IP, a message belonging to the network layer is decapsulated from a packet at the ________ layer. A) network B) transport C) data link D) physical

C) data link

Network Virtual Terminal (NVT) uses two sets of characters, one for _____ and one for __________. A) sending; receiving B) request; reply C) data; control D) None of the choices are correct

C) data; control

In the domain name space, a _________ is a subtree of the domain name space. A) label B) name C) domain D) None of the choices are correct

C) domain

In the domain name space, a full domain name is a sequence of labels separated by ________. A) colons B) semicolons C) dots D) commas

C) dots

A proposed standard is elevated to ________ standard status after at least two successful tries. A) informational B) historic C) draft D) None of the choices are correct

C) draft

DNS can use the services of ________. A) UDP B) TCP C) either UDP or TCP D) None of the choices are correct

C) either UDP or TCP

In TCP/IP, a packet at the third layer carries data belonging to the ________ layer and the header belonging to the _________ layer. A) third; third B) third; fourth C) fourth; third D) fourth; fourth

C) fourth; third

In a _________ name space, each name is made of several parts. A) linear B) flat C) hierarchical D) organized

C) hierarchical

In the _______ encoding scheme, a non-ASCII character is sent as 3 characters. A) 8bit B) base64 C) quoted-printable D) binary

C) quoted-printable

A _______ server is a computer whose zone system consists of the whole tree. A) domain B) zone C) root D) primary

C) root

In a client-server paradigm, a _______ program provides services to a (another) _______ program. A) client; client B) client; server C) server; client D) server; server

C) server; client

In a client-server paradigm A) both the server and the client must be running all the time. B) both the server and the client need to be running only when they are needed. C) the server must be running all the time but the client needs to be running only when it is needed. D) the client must be running all the time but the server needs to be running only when it is needed

C) the server must be running all the time but the client needs to be running only when it is needed.

In FTP, there are three types of _______: stream, block, and compressed. A) file types B) data types C) transmission modes D) none of the choices are correct

C) transmission modes

In the common scenario, the electronic mail system needs _________________________. A) two UAs, two MTAs and one MAA B) two UAs, two MTAs and two MAAs C) two UAs, two pairs of MTAs and a pair of MAAs D) two UAs, two pairs of MTAs and a two pairs of MAAs

C) two UAs, two pairs of MTAs and a pair of MAAs

Gnutella is an example of a ____________ peer-to-peer network A) centralized B) structured-decentralized C) unstructured-decentralized D) None of the choices are correct

C) unstructured-decentralized

In the domain name space, what a server is responsible for or has authority over is called a _________. A) domain B) label C) zone D) None of the choices are correct

C) zone

_____________ is a language for creating a static document. A) Extensible Style Language (XSL) B) Hypertext Markup Language (HTML) C) Extensible Markup Language (XML) D) All choices are correct

D) All choices are correct

In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line. A) request; response B) status; response C) status; status D) None of the choices are correct

D) None of the choices are correct

In Kademlia, the distance between the two identifiers (nodes or keys) are measured as the bitwise-___________ between them. A) AND B) NOR C) OR D) None of the choices are correct

D) None of the choices are correct

In the domain name space, if a label is terminated by a null string, it is called a __________. A) PQDN B) CQDN C) SQDN D) None of the choices are correct

D) None of the choices are correct

The finger table is the routing table used in ______________. A) Gnutella B) Pastry C) Kademlia D) None of the choices are correct

D) None of the choices are correct

The _________ component in the SSH provides confidentiality, integrity, authentication and compression. A) SSH Application B) SSH-AUTH C) SSH-CONN D) SSH-TRAN

D) SSH-TRAN

In the TCP/IP protocol suite, which of the following is a transport layer protocol? A) The Internet Control Message protocol (ICMP) B) The Internet Protocol (IP) C) The Address Resolution Protocol (ARP) D) The Transmission Control Protocol (TCP)

D) The Transmission Control Protocol (TCP)

The Internet Protocol (IP) is ________ protocol. A) a reliable B) a connection-oriented C) a reliable and connection-oriented D) an unreliable

D) an unreliable

In the TCP/IP protocol suite, the physical layer is concerned with the movement of _______ over the physical medium. A) programs B) dialogs C) protocols D) bits

D) bits

In the TCP/IP protocol suite, which of the following is an application layer protocol? A) The User Datagram Protocol (UDP) B) The Internet Protocol (IP) C) The File Transfer Protocol (FTP) D) the Transmission Control Protocol (TCP)

The File Transfer Protocol (FTP)

The largest geographic area a wide area network (WAN) can span is A) a town B) a state C) a country D) the world

The world

The TCP/IP protocol suite consists of _______ layers. A) two B) three C) five D) six

five

A local area network (LAN) is defined by _______________. A) the geometric size of the network B) the maximum number of hosts in the network C) the maximum number hosts in the network and/or the geometric size of the network D) the topology of the network

the geometric size of the network

A router is involved in ____________ layers of the TCP/IP protocol suite. A) two B) three C) four D) five

three

A link-layer switch is involved in ______________ layers of the TCP/IP protocol suite. A) two B) three C) four D) five

two


Related study sets

Medicare License Chapter 2 - Medicare Supplement Policies (Medigap)

View Set

Chapter 36 Gastrointestinal Disorders

View Set

LCSW Exam: Therapist Development Center

View Set

Consumer Behavior Test 2 Practice

View Set

Analogy: Strengths, Weaknesses, Scholars

View Set

EMT Chapter 9 Patient Assessment

View Set