Anda di halaman 1dari 19

25.

Remote Logging, Electronic Mail, and File Transfer

In a _______ name space, a name is assigned to an address. A name in this space is a sequence of characters without structure. A) flat B) hierarchical C) organized D) none of the above In a _________name space, each name is made of several parts. A) flat B) hierarchical C) organized D) none of the above To have a hierarchical name space, a ______________ was designed. A) domain space B) domain name C) domain name space D) none of the above In the DNS, the names are defined in ___________ structure. A) a linear list B) an inverted-tree C) a graph D) none of the above Each node in the tree has a _______, which is a string with a maximum of ___ characters. A) label; 127 B) name; 255 C) label; 63 D) none of the above The root of the DNS tree is _______. A) a string of characters B) a string of 63 characters C) an empty string

D) none of the above 7 A full domain name is a sequence of labels separated by ________. A) semicolons B) dots C) colons D) none of the above If a label is terminated by a null string, it is called a __________. A) PQDN B) FQDN C) SQDN D) none of the above If a label is not terminated by a null string, it is called a __________. A) PQDN B) FQDN C) SQDN D) none of the above A _________ is a subtree of the domain name space. A) label B) name C) domain D) none of the above What a server is responsible for or has authority over is called a _________. A) domain B) label C) zone D) none of the above A _______ is a server whose zone consists of the whole tree. A) domain server B) zone server C) root server D) none of the above A ________ server loads all information from the disk file.

10

11

12

13

A) B) C) D) 14

primary secondary zone none of the above

A ________ server loads all information from the primary server. A) primary B) secondary C) zone D) none of the above When the secondary downloads information from the primary, it is called ______ transfer. A) domain B) zone C) label D) none of the above In the Internet, the domain name space (tree) is divided into _______ different sections: A) three B) two C) four D) none of the above The _______ domains define registered hosts according to their generic behavior. A) generic B) country C) inverse D) none of the above The first level in the generic domains section allows ______ possible labels. A) 10 B) 12 C) 16 D) none of the above The ____________ domain section uses two-character country abbreviations. A) generic B) country

15

16

17

18

19

C) inverse D) none of the above 20 The _________ domain is used to map an address to a name. A) generic B) country C) inverse D) none of the above In __________ resolution, the resolver expects the server to supply the final answer. A) iterative B) recursive C) straight D) none of the above In __________ resolution, the server returns the IP address of the server that it thinks can resolve the query. A) iterative B) recursive C) straight D) none of the above In the domain name chal.atc.fhda.edu, _______ is the least specific label. A) chal B) atc C) edu D) none of the above In the domain name chal.atc.fhda.edu, _______ is the most specific label. A) chal B) atc C) fhda D) none of the above A host with the domain name pit.arc.nasa.gov. is on the _______ level of the DNS hierarchical tree. (The root is level one.) A) third B) fourth C) fifth D) none of the above

21

22

23

24

25

26

A pointer query involves the _______ domain. A) inverse B) reverse C) root D) none of the above DNS can use the services of ________ using the well-known port 53. A) UDP B) TCP C) either (a) or (b) D) none of the above
26. WWW and HTTP

27

TELNET is an abbreviation for ____________. A) terminal network B) telephone network C) telecommunication network D) none of the above TELNET is a ________ client-server application program. A) specific-purpose B) general-purpose C) both a and b D) none of the above When a user logs into a local time-sharing system, it is called ________ login. A) local B) remote C) temporary D) none of the above When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login. A) local B) remote C) temporary

D) none of the above 5 NVT uses two sets of characters, one for _____and one for __________. A) sending; receiving B) request; reply C) data; control D) none of the above For data, NVT uses US ASCII characters with the highest order bit set to ______. A) 1 B) 0 C) a or b D) none of the above For control, NVT uses US ASCII characters with the highest order bit set to ______. A) 1 B) 0 C) a or b D) none of the above TELNET uses only one TCP connection. The server uses ________ port and the client uses ________ port. A) a well-known; another well-known B) an ephemeral; another ephemeral C) a well-known; an ephemeral D) none of the above To distinguish data from control characters, each sequence of control characters is preceded by a special control character called ________. A) ICA B) IAC C) AIC D) none of the above In the _______ mode, the echoing is done by the client. A) default B) character C) line D) none of the above

10

11

In the _______ mode, each character typed is sent by the client to the server. A) default B) character C) line D) none of the above In the ____ mode, line editing (echoing, character erasing, line erasing, and so on) is done by the client. A) default B) character C) line D) none of the above The _______ is software residing on the remote system that allows the remote system to receive characters from a TELNET server. A) terminal driver B) pseudoterminal driver C) TELNET client D) none of the above The _______ translates local characters into NVT form. A) terminal driver B) TELNET client C) TELNET server D) none of the above The _______ translates NVT characters into a form acceptable by the remote operating system. A) terminal driver B) TELNET client C) TELNET server D) none of the above If the sender wants to disable an option, it sends a _______ command. A) WILL B) DO C) WONT D) none of the above

12

13

14

15

16

17

If the sender wants to enable an option, it sends a _______ command. A) WILL B) DO C) WONT D) none of the above If the sender wants an option disabled by the receiver, it sends a _______ command. A) WILL B) DO C) DONT D) none of the above If the sender wants an option enabled by the receiver, it sends a _______ command. A) WILL B) DO C) WONT D) none of the above _______ is the standard mechanism provided by TCP/IP for copying a file from one host to another. A) TELNET B) SMTP C) TFTP D) none of the above FTP uses the services of ________. A) UDP B) IP C) TCP D) none of the above In FTP, the well-known port ____ is used for the control connection and the wellknown port ________ for the data connection. A) 21; 22 B) 21; 20 C) 20; 21 D) none of the above In FTP, _______ is the service type used by the IP protocol because this is an interactive connection between a user (human) and a server.

18

19

20

21

22

23

A) B) C) D) 24

maximize throughput minimize delay minimize error none of the above

For the control connection, FTP uses the __________ character set A) regular ASCII B) EBCDIC C) NVT ASCII D) none of the above During an FTP session the control connection is opened _______. A) exactly once B) exactly twice C) as many times as necessary D) none of the above During an FTP session the data connection is opened _______. A) exactly once B) exactly twice C) as many times as necessary D) none of the above In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _______. A) file types B) data structures C) transmission modes D) none of the above In FTP, there are three types of _______: stream, block, and compressed. A) file types B) data structures C) transmission modes D) none of the above In FTP, ASCII, EBCDIC, and image define an attribute called _______. A) file type B) data structure C) transmission mode

25

26

27

28

29

D) none of the above 30 In FTP, when we _______, it is copied from the server to the client. A) retrieve a file B) retrieve a list C) a and c D) none of the above In FTP, when we _______, it is copied from the client to the server. A) retrieve a file B) store a file C) retrieve a list D) none of the above ________ is part of a local hard drive, a special file with permission restrictions. A) A message B) A response C) An agent D) None of the above When the sender and the receiver of an email are on the same system, we need only ___________. A) one UA B) two UAs C) one UA and one MTA D) none of the above When the sender and the receiver of an email are on different systems, we need only _____________. A) one MTA B) two UAs C) two UAs and one pair of MTAs D) none of the above When the sender is connected to the mail server via a LAN or a WAN, we need ______________. A) two MTA B) two UAs and two pairs of MTAs C) two UAs and a pair of MTAs D) none of the above

31

32

33

34

35

36

When both sender and receiver are connected to a mail server via a LAN or a WAN, we need ___________________. A) two UAs, two pairs of MTAs, and a pair of MAAs B) two UAs, and two pairs of MTAs C) two UAs, two pairs of MTAs, and two pairs of MAAs D) none of the above ________ provides service to the user to make the process of sending and receiving a message easier. A) An MTA B) An MAA C) A UA D) none of the above Which of the following services is not provided by a UA? A) composing messages B) reading messages C) replying messages D) all are There are two types of user agents: _________ and ___________. A) command-driven; data-driven B) command-driven; GUI-based C) command-based and data-based D) none of the above The ________ usually contains the sender address, the receiver address, and other information. A) message B) envelope C) both a and b D) none of the above The message contains the ________ and the __________. A) header; envelop B) header; body C) envelop; body D) none of the above

37

38

39

40

41

42

In the Internet, the email address consists of two parts: a _______ and a _______. A) local part; domain name B) global part; domain name C) label; domain name D) none of the above _________ is a supplementary protocol that allows non-ASCII data to be sent through email. A) JPEG B) MPEG C) MIME D) none of the above The actual mail transfer is done through ____________. A) UAs B) MTAs C) MAAs D) none of the above The formal protocol that defines the MTA client and server in the Internet is called ___________. A) SMTP B) SNMP C) TELNET D) none of the above The process of transferring a mail message occurs in ________ phases. A) two B) four C) five D) none of the above SMTP is a __________protocol. A) pull B) push C) both a and b D) none of the above The third stage in an email transfer needs a ________ protocol.

43

44

45

46

47

48

A) B) C) D) 49

pull push both a and b none of the above

The third stage in an email transfer uses a(n) ________ protocol. A) UA B) MTA C) MAA D) none of the above Currently two message access protocols are available: _______ and _________. A) POP3; IMAP2 B) POP4; IMAP1 C) POP3; IMAP4 D) none of the above Which part of the mail created by the UA contains the sender and receiver names? A) envelope B) address C) header D) none of the above The MIME _______ header uses text to describe the type of data in the body of the message. A) content-type B) content-transfer-encoding C) content-description D) none of the above _______ is more powerful and complex than _______. A) POP3; IMAP4 B) IMAP4; POP3 C) SMTP; POP3 D) none of the above

50

51

52

53

27. Network Management: SNMP

_________ is a repository of information linked together from points all over the world. A) The WWW B) HTTP C) HTML D) none of the above The WWW today is a _______ client-server service, in which a client using a browser can access a service using a server. A) limited B) vast C) distributed D) none of the above The _________ is a standard for specifying any kind of information on the Internet. A) URL B) ULR C) RLU D) none of the above In a URL, the _______ is the client-server program used to retrieve the document. A) path B) protocol C) host D) none of the above In a URL, the ______ is the computer on which the information is located. A) path B) protocol C) host D) none of the above

In a URL, an optional ________ can be inserted between the host and the path, and it is separated from the host by a colon. A) path B) protocol C) host D) none of the above In a URL, the _______ is the full name of the file where the information is located. A) path B) protocol C) host D) none of the above A cookie is made by the ________ and eaten by the _________. A) client; client B) client; server C) server; server D) none of the above The documents in the WWW can be grouped into ______ broad categories. A) two B) three C) four D) none of the above A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only. A) static B) dynamic C) active D) none of the above _____________ is a language for creating Web pages. A) HTTP B) HTML C) FTTP D) none of the above A _______ document is created by a Web server whenever a browser requests the document.

10

11

12

A) B) C) D) 13

static dynamic active none of the above

___________ is a technology that creates and handles dynamic documents. A) GIC B) CGI C) GCI D) none of the above Dynamic documents are sometimes referred to as _________ dynamic documents. A) client-site B) server-site C) both a and b D) none of the above For many applications, we need a program or a script to be run at the client site. These are called _______________ documents. A) static B) dynamic C) active D) none of the above One way to create an active document is to use __________. A) CGI B) Java stand-alone programs C) Java applets D) none of the above Active documents are sometimes referred to as _________ dynamic documents. A) client-site B) server-site C) both a and b D) none of the above HTTP uses the services of _________ on well-known port 80. A) UDP B) IP C) TCP

14

15

16

17

18

D) none of the above 19 In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line. A) request; response B) response; request C) response; status D) none of the above In a ___________ connection, one TCP connection is made for each request/response. A) persistent B) nonpersistent C) both a and b D) none of the above In a ___________connection, the server leaves the connection open for more requests after sending a response. A) persistent B) nonpersistent C) both a and b D) none of the above HTTP version 1.1 specifies a _________connection by default. A) persistent B) nonpersistent C) both a and b D) none of the above In HTTP, a _______ server is a computer that keeps copies of responses to recent requests. A) regular B) proxy C) both a and b D) none of the above An HTTP request message always contains _______. A) a header and a body B) a request line and a header C) a status line, a header, and a body

20

21

22

23

24

D) none of the above 25 Which of the following is present in both an HTTP request line and a status line? A) HTTP version number B) URL C) status code D) none of the above The HTTP request line contains a _______ method to request a document from the server. A) GET B) POST C) COPY D) none of the above A user needs to send the server some information. The request line method is _______. A) OPTION B) PATCH C) POST D) none of the above The HTTP request line contains a _______ method to get information about a document without retrieving the document itself. A) HEAD B) POST C) COPY D) none of the above A response message always contains _______. A) a header and a body B) a request line and a header C) a status line and a header D) none of the above An applet is _______ document application program. A) a static B) an active C) a passive D) a dynamic

26

27

28

29

30

28. Multimedia

* Cryptography is the science and art of transforming messages to make them secure and immune to attack. * Encryption renders a message (plaintext) unintelligible to unauthorized personnel. * Decryption transforms an intentionally unintelligible message (ciphertext) into meaningful information. * Cryptography algorithms are classified as either symmetric-key methods or public-key methods. * In symmetric-key cryptography the same secret key is used by the sender and the receiver. * Substitution ciphers are either monoalphabetic or polyalphabetic. * The P-box, S-box, and product block are methods used by block ciphers. * DES is a symmetric-key method adopted by the U.S. government, but it has been replaced by Triple DES or other methods. * Operation modes to handle long messages include ECB mode, CBC mode, CFM, and CSM. * In public-key cryptography, the public key is used by the sender to encrypt the message; the private key is used by the receiver to decrypt the message. * One of the commonly used public-key cryptography methods is the RSA algorith.

Anda mungkin juga menyukai