Chapter 11 Questions – Networked Applications
1. The processing is done only on a centralized machine in the _____ architecture.
a. client/server
b. P2P
c. terminal-host
d. stand-alone
Reference: p. 354
2. In client/server processing, the processing is done only on the server.
a. True
b. False
Reference: p. 357
3. In file server program access, the processing is done on the ___.
a. client
b. server
c. Both of the above.
d. host computer
Reference: p. 356
4. Which of the following is not very scalable?
a. File server program access.
b. Terminal-host processing.
c. Both are highly scalable.
d. Neither is highly scalable.
Reference: p. 357
5. What is the main factor that distinguishes client/server architecture from terminal-host architecture?
a. Client/server architecture is able to support more users simultaneously.
b. Client/server architecture allows data to be shared with multiple clients.
c. Client/server architecture uses the processing power of both the client and server.
d. Client/server architecture is less vulnerable to hacking and viruses.
Reference: p. 355
6. File server program access is a form of client/server architecture.
a. True
b. False
Reference: p. 357
7. Viewing Web pages using a Web browser is an example of a client/server architecture.
a. True
b. False
Reference: p. 357
8. The most common way that viruses and worms are spread is via:
a. FTP.
b. instant messaging.
c. e-mail.
d. Web browsing.
e. sharing diskettes.
Reference: p. 359
9. RFC 822 and RFC 2822 standards govern:
a. plain text content of e-mail messages.
b. HTTP page contents.
c. HTML commands and content.
d. plain text, graphic, and video content of e-mail messages.
e. HTML commands.
Reference: p. 359
10. SMTP is a standard used at the ____ layer to transfer mail messages.
a. Physical
b. Application
c. Internet
d. Data Link
e. Transport
Reference: pp. 354 and 360
11. Mail servers communicate with each other using:
a. POP.
b. IMAP.
c. either POP or IMAP.
d. RFC 2822.
e. SMTP.
Reference: p. 360
12. An e-mail user sending messages to their mail server would most likely use:
a. the IMAP standard.
b. the POP standard.
c. either the IMAP or POP standard.
d. the SMTP standard.
e. RFC 2822.
Reference: p. 360
13. _____ depend on the ability of mail servers to store messages.
a. Senders
b. Receivers
Reference: p. 360
14. An e-mail user receiving messages from their mail server might use:
a. the IMAP standard.
b. the POP standard.
c. either the IMAP or POP standard.
d. the SMTP standard.
Reference: p. 360
15. If you are using a Web-enabled e-mail system:
a. all of your incoming and outgoing messages must be composed using HTML.
b. you have to install a special Web-enabled e-mail client to access your e-mail.
c. you access and send mail using a Web browser.
d. you are more likely to be susceptible to viruses being introduced on your computer.
e. you are unable to send/receive e-mail messages containing information other than letters or numbers.
Reference: p. 361
16. _____ is a standard to describe the format of file attachments in e-mail.
a. RFC 2822
b. SMTP
c. HTML
d. MIME
Reference: p. 363
17. HTTP is used at the ______layer.
a. Physical
b. Data Link
c. Application
d. Internet
e. Transport
Reference: pp. 354 and 363
18. Which of the following is used to retrieve Web pages?
a. HTTP
b. HTML
Reference: p. 362
19. How many HTTP request-response cycles are needed to transfer a Web page containing 88 lines of text and 3 different images?
a. 1
b. 3
c. 4
d. 88
e. 91
Reference: p. 363
20. Which of the following is NOT normally a component of an e-commerce system?
a. A file server
b. An Internet site
c. A multiplexer
d. Customer relationship management system
e. A firewall
Reference: p. 364-366
21. It is normal for e-commerce systems to connect to other organizations to perform related tasks such as credit card processing.
a. True
b. False
Reference: p. 365
22. Application servers _____.
a. interact with users
b. store the data the user wishes to have
c. Both of the above.
d. Neither a. nor b.
Reference: p. 366
23. Application servers normally interact with database servers using _____.
a. API
b. SMTP
c. LDAP
d. MIME
Reference: p. 367
24. SSL security is implemented at the ______layer.
a. Physical
b. Internet
c. Transport
d. Data link
e. Application
Reference: p. 367
25. A hardened server refers to a server that:
a. is hard to reach because it exists inside of a firewall.
b. is protected from physical problems such as power outages and water leakage.
c. is protected against attacks from hackers.
d. is not connected to the Internet but is only reachable through an intranet.
e. has been temporarily saturated with traffic.
Reference: p. 368
26. It is a good idea to place webserver to server external customers in a DMZ.
a. True
b. False
Reference: p. 367
27. Most basic web services communicate using:
a. the first available unused port.
b. the first available port number above 1023.
c. the first available port number below 1023.
d. Port 25.
e. Port 80.
Reference: p. 371
28. SOAP messages _____.
a. are created using the XML syntax
b. usually are delivered via HTTP
c. Both of the above.
d. Neither a. nor b.
Reference: p. 370
29. The UDDI protocol is useful for:
a. allowing Web services to advertise themselves to potential users.
b. scanning incoming HTTP requests for viruses and other hacker-related mischief.
c. detecting whether a server is being scanned by a potential hacker.
d. rerouting e-commerce traffic to alternative servers when the requested server is busy.
e. tracing the source of an incoming e-commerce service request.
Reference: p. 371
30. Which of the following is considered a bigger problem with traditional client/server based architectures than with peer-to-peer architectures?
a. Processing control at the client’s PC
b. The likelihood of traffic congestion at a client’s PC
c. Underutilized processing capacity of client PCs
d. Potential that essential data/services could become unavailable as a device is turned off
Reference: p. 373
31. To be considered a peer-to-peer application architecture, there can be no dedicated servers included on the network.
a. True
b. False
Reference: p. 373
32. Which of the following uses servers?
a. Gnutella
b. Napster
c. Both of the above.
d. Neither a. nor b.
Reference: p. 374-375
33. What important standard governs videoconferencing and IP telephony?
a. DHCP
b. H.323
c. SMTP
d. V.IP
e. SNMP
Reference: p. 375
34. Two users communicating directly with each other using IP telephony is a good example of a peer-to-peer networked application.
a. True
b. False
Reference: p. 376
35. Which of the following takes advantage of idle user PC processing capacity?
a. Napster
b. SETI@home
c. H.323
Reference: p. 377
8