(完整版)计算机网络教程自顶向下方法选择题及答案Chapt2ApplicationLayer-QUIZZ_第1页
(完整版)计算机网络教程自顶向下方法选择题及答案Chapt2ApplicationLayer-QUIZZ_第2页
(完整版)计算机网络教程自顶向下方法选择题及答案Chapt2ApplicationLayer-QUIZZ_第3页
(完整版)计算机网络教程自顶向下方法选择题及答案Chapt2ApplicationLayer-QUIZZ_第4页
(完整版)计算机网络教程自顶向下方法选择题及答案Chapt2ApplicationLayer-QUIZZ_第5页
已阅读5页,还剩9页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、Chapter 2 Application Layer1.In a client-server paradigm, a program provides services to a (another) program.A) client; clientB) client; serverC) server; clientD) server; server2.In a client-server paradigmA) both the server and the client must be running all the time.B) both the server and the clie

2、nt need to be running only when they are needed.C) the server must be running all the time but the client needs to be runningonly when it isneeded.D) the client must be running all the time but the server needs to be running only when it is needed3.The first section of a URL identifier is the .A) pr

3、otocolB) pathC) hostD) port4.A document is a fixed-content document that is created and stored in a server. The clientcan get a copy of the document only.A) staticB) dynamicC) activeD) None of the choices are correct5.is a language for creating a static document.A) Extensible Style Language (XSL)B)

4、Hypertext Markup Language (HTML)C) Extensible Markup Language (XML)D) All choices are correct6.A document is created by a Web server whenever a browser requests the document.A) staticB) dynamicC) activeD) None of the choices are correct7.For many applications, we need a program or a script to be run

5、 at the client site. These are calleddocuments.A) staticB) dynamicC) activeD) None of the choices are correct8.HTTP uses the services of .A) UDPB) IPC) TCPD) DNS9.In HTTP, the first line in a request message is called a line; the first line in the responsemessage is called the line.A) request; respo

6、nseB) status; responseC) status; statusD) None of the choices are correct10.In a connection, one TCP connection is made for each request/response.A) persistentB) nonpersistentC) persistent or a nonpersistentD) None of the choices are correct11.In a connection, the server leaves the connection open f

7、or more requests after sendinga response.A) persistentB) nonpersistentC) persistent or nonpersistentD) None of the choices are correct12.In HTTP, server is a computer that keeps copies of responses to recent requests.A) a regularB) a proxyC) an auxiliaryD) a remote13.An HTTP request message always c

8、ontains .A) a header line and a bodyB) a request line and a header lineC) a request line, a header line, and a bodyD) a request line, a header line, a blank line, and a body14.Which of the following is present in both an HTTP request line and a status line?A) version numberB) URLC) status codeD) met

9、hod15.FTP uses the services of .A) UDPB) IPC) TCPD) none of the choices are correct16.In FTP, well-known port(s) is (are) used.A) oneB) twoC) threeD) four17.During an FTP session the control connection is opened .A) onceB) twiceC) many timesD) none of the choices are correct18.During an FTP session

10、the data connection may be opened .A) only onceB) only two timesC) as many times as neededD) none of the choices are correct19.In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called .A) file typesB) data structuresC) transmission modesD) non

11、e of the choices are correct20.In FTP, there are three types of : stream, block, and compressed.A) file typesB) data typesC) transmission modesD) none of the choices are correct21.In FTP, ASCII, EBCDIC, and image define an attribute called .A) file typeB) data structureC) transmission modeD) none of

12、 the choices are correct22.In FTP, when we , it is copied from the client to the server.A) retrieve a fileB) store a fileC) open a fileD) none of thechoices are correct23.In the common scenario, the electronic mail system needs .A) twoUAs,two MTAs and one MAAB) twoUAs,two MTAs and two MAAsC) twoUAs,

13、two pairs of MTAs and a pairof MAAsD) twoUAs,two pairs of MTAs and a twopairs of MAAvides service to the user to make the process of sending or receiving a message easier.A) An MTAB) An MAAC) A UAD) None of the choices are correct25.An e-mail message contains the and the .A) header; envelopB)

14、 header; bodyC) envelop; bodyD) None of the choices are correct26.In the Internet, an e-mail address consists of two parts: a and a .A) local part; domain nameB) global part; domain nameC) label; domain nameD) local part; label27.is a supplementary protocol that allows non-ASCII data to be sent thro

15、ugh e-mail.A) SMPTB) MPEGC) MIMED) POP29.The formal protocol that defines the MTA client and server in the Internet is called .A) SMTPB) SNMPC) TELNETD) SSH29.SMTP is a protocol.A) pullB) pushC) push and pullD) None of the choices are correct30.The message access protocol is a protocol.A) pullB) pus

16、hC) push and pullD) None of the choices are correct31.In the encoding scheme, each 24 bits become four 6-bit chunks, and eventually are sent as32 bits.A) 8bitB) binaryC) base64D) quoted-printable32.In the encoding scheme, a non-ASCII character is sent as 3 characters.A) 8bitB) base64C) quoted-printa

17、bleD) binary33.TELNET is an abbreviation for .A) terminal networkB) telephone networkC) telecommunication networkD) None of the choices are correct34.When a user logs into a local time-sharing system, it is called login.A) localB) remoteC) local or remoteD) None of the choices are correct35.When a u

18、ser wants to access an application program or utility located on a remote machine, he or she performs login.A) localB) remoteC) local or remoteD) None of the choices are correct36.Network Virtual Terminal (NVT) uses two sets of characters, one for and one for .A) sending; receivingB) request; replyC

19、) data; controlD) None of the choices are correct37.For data, NVT uses US ASCII characters with the highest order bit set to .A) 1B) 0C) 1 or 0D) None of the choices are correct38.For control, NVT uses US ASCII characters with the highest order bit set to .A) 1B) 0C) 1 or 0D) None of the choices are

20、 correct39.The translates local characters into NVT characters.A) terminal driverB) TELNET clientC) TELNET serverD) pseudoterminal driver40.The translates NVT characters into a form acceptable by the remote operating system.A) terminal driverB) TELNET clientC) TELNET serverD) pseudoterminal driver41

21、.The component in the SSH provides confidentiality, integrity, authentication andcompression.A) SSH ApplicationB) SSH-AUTHC) SSH-CONND) SSH-TRAN42.Port forwarding is .A) a protocol used to forward messages from one port to another portB) a procedure for changing an ephemeral port to a well-known por

22、tC) a service, provided by SSH, that creates a secure channel for applications that do not have security services.D) None of the choices are correct43.In a name space, a name is a sequence of characters without structure.A) linearB) flatC) hierarchicalD) organized44.In a name space, each name is mad

23、e of several parts.A) linearB) flatC) hierarchicalD) organized45.In the DNS, the names are defined in structure.A) a linear listB) an inverted-treeC) a three-dimensionalD) None of the choices are correct46.The root of the DNS tree is .A) a string of 127 charactersB) a string of 63 charactersC) a str

24、ing of 15 charactersD) an empty string47.In the domain name space, a full domain name is a sequence of labels separated by .A) colonsB) semicolonsC) dotsD) commas48.In the domain name space, if a label is terminated by a null string, it is called a .A) PQDNB) CQDNC) SQDND) None of the choices are co

25、rrect49.In the domain name space, if a label is not terminated by a null string, it is called a .A) FQDNB) PQDNC) SQDND) None of the choices are correct50.In the domain name space, a is a subtree of the domain name space.A) labelB) nameC) domainD) None of the choices are correct51.In the domain name

26、 space, what a server is responsible for or has authority over is called aA) domainB) labelC) zoneD) None of the choices are correct52.A server is a computer whose zone system consists of the whole tree.A) domainB) zoneC) rootD) primary53.A server is a computer that stores a file about the zone for

27、which it has an authority.A) primaryB) secondaryC) zoneD) root54.A server is a computer that transfers the complete information about a zone from anotherserver.A) primaryB) secondaryC) zoneD) root55.In the Internet, the country domain section uses country abbreviations.A) two-characterB) three-chara

28、cterC) four-characterD) None of the choices are correct56.In resolution, the resolver expects the server to supply the final answer.A) iterativeB) recursiveC) straightD) None of the choices are correct57.In resolution, the server returns the IP address of the server that it thinks can resolve theque

29、ry.A) iterativeB) recursiveC) straightD) None of the choices are correct58.DNS can use the services of .A) UDPB) TCPC) either UDP or TCPD) None of the choices are correct59.A registrar, a commercial entity accredited by is responsible for adding new domains toDNS data baseA) NICB) ICANNC) ISOCD) IEF

30、E60.In a centralized P2P network, the directory system uses the paradigm; the storing anddownloading of thefiles are done using paradigm.A) client-server;client-serverB) peer-to-peer;client-serverC) client-server;peer-to-peerD) peer-to-peer;peer-to-peer61.Napster is an example of a peer-to-peer netw

31、orkA) centralizedB) structured-decentralizedC) unstructured-decentralizedD) None of the choices are correct62.Gnutella is an example of a peer-to-peer networkA) centralizedB) structured-decentralizedC) unstructured-decentralizedD) None of the choices are correct63.BitTorrent is an example of a peer-

32、to-peer networkA) centralizedB) structured-decentralizedC) unstructured-decentralizedD) None of the choices are correct64.In a structured-decentralized P2P network, .A) the directory system is kept in a centerB) a query to find a file must be flooded through the networkC) a pre-defined set of rules

33、is used to link nodes so that a query can be effectively and efficiently resolvedD) None of the choices are correct65.In a DHT-based network, each peerA) has a partial knowledge about the whole network.B) has a complete knowledge about the whole network.C) only has a knowledge about its successor.D) None of the choices are correct66.The finger table is the routing table used in .A) GnutellaB) PastryC) KademliaD) None of the choices are correct67.Which of the following is not a Chord interfac

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

最新文档

评论

0/150

提交评论