admin 管理员组文章数量: 887192
2024年2月23日发(作者:广告设计网页)
Chapter 2 Application Layer
1.
In a client-server paradigm, a _______ program provides services to a (another) _______ program.
A) client; client
B) client; server
C) server; client
D) server; server
2.
In a client-server paradigm
A) both the server and the client must be running all the time.
B) both the server and the client need to be running only when they are needed.
C) the server must be running all the time but the client needs to be running only when it is
needed.
D) the client must be running all the time but the server needs to be running only when it is
needed
3.
The first section of a URL identifier is the __________.
A) protocol
B) path
C) host
D) port
4.
A _______ document is a fixed-content document that is created and stored in a server. The client
can get a copy of the document only.
A) static
B) dynamic
C) active
D) None of the choices are correct
5.
_____________ is a language for creating a static document.
A) Extensible Style Language (XSL)
B) Hypertext Markup Language (HTML)
C) Extensible Markup Language (XML)
D) All choices are correct
6.
A _______ document is created by a Web server whenever a browser requests the document.
A) static
B) dynamic
C) active
D) None of the choices are correct
7.
For many applications, we need a program or a script to be run at the client site. These are called
_______________ documents.
A) static
B) dynamic
C) active
D) None of the choices are correct
8.
HTTP uses the services of _________.
A) UDP
B) IP
C) TCP
D) DNS
9.
In HTTP, the first line in a request message is called a _______ line; the first line in the response
message is called the ________ line.
A) request; response
B) status; response
C) status; status
D) None of the choices are correct
10.
In a ___________ connection, one TCP connection is made for each request/response.
A) persistent
B) nonpersistent
C) persistent or a nonpersistent
D) None of the choices are correct
11.
In a ___________ connection, the server leaves the connection open for more requests after sending
a response.
A) persistent
B) nonpersistent
C) persistent or nonpersistent
D) None of the choices are correct
12.
In HTTP, _______ server is a computer that keeps copies of responses to recent requests.
A) a regular
B) a proxy
C) an auxiliary
D) a remote
13.
An HTTP request message always contains _______.
A) a header line and a body
B) a request line and a header line
C) a request line, a header line, and a body
D) a request line, a header line, a blank line, and a body
14.
Which of the following is present in both an HTTP request line and a status line?
A) version number
B) URL
C) status code
D) method
15.
FTP uses the services of ________.
A) UDP
B) IP
C) TCP
D) none of the choices are correct
16.
In FTP, _________ well-known port(s) is (are) used.
A) one
B) two
C) three
D) four
17.
During an FTP session the control connection is opened _______.
A) once
B) twice
C) many times
D) none of the choices are correct
18.
During an FTP session the data connection may be opened _______.
A) only once
B) only two times
C) as many times as needed
D) none of the choices are correct
19.
In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an
attribute called _______.
A) file types
B) data structures
C) transmission modes
D) none of the choices are correct
20.
In FTP, there are three types of _______: stream, block, and compressed.
A) file types
B) data types
C) transmission modes
D) none of the choices are correct
21.
In FTP, ASCII, EBCDIC, and image define an attribute called _______.
A) file type
B) data structure
C) transmission mode
D) none of the choices are correct
22.
In FTP, when we _______, it is copied from the client to the server.
A) retrieve a file
B) store a file
C) open a file
D) none of the choices are correct
23.
In the common scenario, the electronic mail system needs _________________________.
A) two UAs, two MTAs and one MAA
B) two UAs, two MTAs and two MAAs
C) two UAs, two pairs of MTAs and a pair of MAAs
D) two UAs, two pairs of MTAs and a two pairs of MAAs
24.
________ provides service to the user to make the process of sending or receiving a message easier.
A) An MTA
B) An MAA
C) A UA
D) None of the choices are correct
25.
An e-mail message contains the ________ and the __________.
A) header; envelop
B) header; body
C) envelop; body
D) None of the choices are correct
26.
In the Internet, an e-mail address consists of two parts: a _______ and a _______.
A) local part; domain name
B) global part; domain name
C) label; domain name
D) local part; label
27.
_________ is a supplementary protocol that allows non-ASCII data to be sent through e-mail.
A) SMPT
B) MPEG
C) MIME
D) POP
28.
The formal protocol that defines the MTA client and server in the Internet is called ___________.
A) SMTP
B) SNMP
C) TELNET
D) SSH
29.
SMTP is a __________ protocol.
A) pull
B) push
C) push and pull
D) None of the choices are correct
30.
The message access protocol is a ________ protocol.
A) pull
B) push
C) push and pull
D) None of the choices are correct
31.
In the _______ encoding scheme, each 24 bits become four 6-bit chunks, and eventually are sent as
32 bits.
A) 8bit
B) binary
C) base64
D) quoted-printable
32.
In the _______ encoding scheme, a non-ASCII character is sent as 3 characters.
A) 8bit
B) base64
C) quoted-printable
D) binary
33.
TELNET is an abbreviation for ____________.
A) terminal network
B) telephone network
C) telecommunication network
D) None of the choices are correct
34.
When a user logs into a local time-sharing system, it is called ________ login.
A) local
B) remote
C) local or remote
D) None of the choices are correct
35.
When a user wants to access an application program or utility located on a remote machine, he or
she performs ___________ login.
A) local
B) remote
C) local or remote
D) None of the choices are correct
36.
Network Virtual Terminal (NVT) uses two sets of characters, one for _____ and one for __________.
A) sending; receiving
B) request; reply
C) data; control
D) None of the choices are correct
37.
For data, NVT uses US ASCII characters with the highest order bit set to ______.
A) 1
B) 0
C) 1 or 0
D) None of the choices are correct
38.
For control, NVT uses US ASCII characters with the highest order bit set to ______.
A) 1
B) 0
C) 1 or 0
D) None of the choices are correct
39.
The _______ translates local characters into NVT characters.
A) terminal driver
B) TELNET client
C) TELNET server
D) pseudoterminal driver
40.
The _______ translates NVT characters into a form acceptable by the remote operating system.
A) terminal driver
B) TELNET client
C) TELNET server
D) pseudoterminal driver
41.
The _________ component in the SSH provides confidentiality, integrity, authentication and
compression.
A) SSH Application
B) SSH-AUTH
C) SSH-CONN
D) SSH-TRAN
42.
Port forwarding is ____________________________.
A) a protocol used to forward messages from one port to another port
B) a procedure for changing an ephemeral port to a well-known port
C) a service, provided by SSH, that creates a secure channel for applications that do not have
security services.
D) None of the choices are correct
43.
In a _______ name space, a name is a sequence of characters without structure.
A) linear
B) flat
C) hierarchical
D) organized
44.
In a _________ name space, each name is made of several parts.
A) linear
B) flat
C) hierarchical
D) organized
45.
In the DNS, the names are defined in ___________ structure.
A) a linear list
B) an inverted-tree
C) a three-dimensional
D) None of the choices are correct
46.
The root of the DNS tree is _______.
A) a string of 127 characters
B) a string of 63 characters
C) a string of 15 characters
D) an empty string
47.
In the domain name space, a full domain name is a sequence of labels separated by ________.
A) colons
B) semicolons
C) dots
D) commas
48.
In the domain name space, if a label is terminated by a null string, it is called a __________.
A) PQDN
B) CQDN
C) SQDN
D) None of the choices are correct
49.
In the domain name space, if a label is not terminated by a null string, it is called a __________.
A) FQDN
B) PQDN
C) SQDN
D) None of the choices are correct
50.
In the domain name space, a _________ is a subtree of the domain name space.
A) label
B) name
C) domain
D) None of the choices are correct
51.
In the domain name space, what a server is responsible for or has authority over is called a
_________.
A) domain
B) label
C) zone
D) None of the choices are correct
52.
A _______ server is a computer whose zone system consists of the whole tree.
A) domain
B) zone
C) root
D) primary
53.
A ________ server is a computer that stores a file about the zone for which it has an authority.
A) primary
B) secondary
C) zone
D) root
54.
A ________ server is a computer that transfers the complete information about a zone from another
server.
A) primary
B) secondary
C) zone
D) root
55.
In the Internet, the country domain section uses ___________ country abbreviations.
A) two-character
B) three-character
C) four-character
D) None of the choices are correct
56.
In __________ resolution, the resolver expects the server to supply the final answer.
A) iterative
B) recursive
C) straight
D) None of the choices are correct
57.
In __________ resolution, the server returns the IP address of the server that it thinks can resolve the
query.
A) iterative
B) recursive
C) straight
D) None of the choices are correct
58.
DNS can use the services of ________.
A) UDP
B) TCP
C) either UDP or TCP
D) None of the choices are correct
59.
A registrar, a commercial entity accredited by ________ is responsible for adding new domains to
DNS data base
A) NIC
B) ICANN
C) ISOC
D) IEFE
60.
In a centralized P2P network, the directory system uses the ________ paradigm; the storing and
downloading of the files are done using __________ paradigm.
A) client-server; client-server
B) peer-to-peer; client-server
C) client-server; peer-to-peer
D) peer-to-peer; peer-to-peer
61.
Napster is an example of a ____________ peer-to-peer network
A) centralized
B) structured-decentralized
C) unstructured-decentralized
D) None of the choices are correct
62.
Gnutella is an example of a ____________ peer-to-peer network
A) centralized
B) structured-decentralized
C) unstructured-decentralized
D) None of the choices are correct
63.
BitTorrent is an example of a ____________ peer-to-peer network
A) centralized
B) structured-decentralized
C) unstructured-decentralized
D) None of the choices are correct
64.
In a structured-decentralized P2P network, ________________.
A) the directory system is kept in a center
B) a query to find a file must be flooded through the network
C) a pre-defined set of rules is used to link nodes so that a query can be effectively and efficiently
resolved
D) None of the choices are correct
65.
In a DHT-based network, each peer
A) has a partial knowledge about the whole network.
B) has a complete knowledge about the whole network.
C) only has a knowledge about its successor.
D) None of the choices are correct
66.
The finger table is the routing table used in ______________.
A) Gnutella
B) Pastry
C) Kademlia
D) None of the choices are correct
67.
Which of the following is not a Chord interface.
A) Lookup
B) Fix node
C) Stabilize
D) Join
68.
In __________ a key is stored in a node whose identifier is numerically closest to the key.
A) Chord
B) Pastry
C) Kademlia
D) None of the choices are correct
69.
To resolve a query, _________ uses two entities: a routing table and a leaf set.
A) Chord
B) Pastry
C) Kademlia
D) None of the choices are correct
70.
In Kademlia, the distance between the two identifiers (nodes or keys) are measured as the
bitwise-___________ between them.
A) AND
B) NOR
C) OR
D) None of the choices are correct
71.
In ________, nodes and data items are m-bit identifiers that create an identifier space of 2m points
distributed at the leaves of a binary tree
A) Chord
B) Pastry
C) Kademlia
D) None of the choices are correct
72.
In Kademlia, each node in the network divides the binary tree into m subtrees that.
A) include the node itself
B) do not include the node itself
C) include the node itself and the successor node
D) None of the choices are correct
73.
Trackerless BitTorrent uses __________ DHT to do the job of tracking.
A) Chord
B) Pastry
C) Kademlia
D) None of the choices are correct
CCAAD BCCDB ABBAC BACBC ABCCB ACABA CCAAB CBABC DCBCB
CCDBC CCABA BACBC ACBCA DBBBD CBC
版权声明:本文标题:教程自顶向下方法选择题及答案Chapt2ApplicationLayer-QUIZZ_ 内容由网友自发贡献,该文观点仅代表作者本人, 转载请联系作者并注明出处:http://www.freenas.com.cn/free/1708646226h528506.html, 本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌抄袭侵权/违法违规的内容,一经查实,本站将立刻删除。
发表评论