Chapter 11 Questions – Networked Applications

1. The processing is done only on a centralized machine in the _____ architecture.

a. client/server

b. P2P

c. terminal-host

d.  stand-alone

Reference: p. 354

2. In client/server processing, the processing is done only on the server.

a. True

b.  False

Reference: p. 357

3. In file server program access, the processing is done on the ___.

a. client

b. server

c. Both of the above.

d. host computer

Reference: p. 356

4. Which of the following is not very scalable?

a. File server program access.

b. Terminal-host processing.

c. Both are highly scalable.

d. Neither is highly scalable.

Reference: p. 357

5. What is the main factor that distinguishes client/server architecture from terminal-host architecture?

a. Client/server architecture is able to support more users simultaneously.

b. Client/server architecture allows data to be shared with multiple clients.

c. Client/server architecture uses the processing power of both the client and server.

d. Client/server architecture is less vulnerable to hacking and viruses.

Reference: p. 355

6. File server program access is a form of client/server architecture.

a. True

b.  False

Reference: p. 357

7. Viewing Web pages using a Web browser is an example of a client/server architecture.

a. True

b.  False

Reference: p. 357

8. The most common way that viruses and worms are spread is via:

a. FTP.

b. instant messaging.

c. e-mail.

d. Web browsing.

e.  sharing diskettes.

Reference: p. 359

9. RFC 822 and RFC 2822 standards govern:

a. plain text content of e-mail messages.

b. HTTP page contents.

c. HTML commands and content.

d. plain text, graphic, and video content of e-mail messages.

e. HTML commands.

Reference: p. 359

10. SMTP is a standard used at the ____ layer to transfer mail messages.

a. Physical

b. Application

c. Internet

d. Data Link

e. Transport

Reference: pp. 354 and 360

11. Mail servers communicate with each other using:

a. POP.

b. IMAP.

c. either POP or IMAP.

d. RFC 2822.

e. SMTP.

Reference: p. 360

12. An e-mail user sending messages to their mail server would most likely use:

a. the IMAP standard.

b. the POP standard.

c. either the IMAP or POP standard.

d. the SMTP standard.

e. RFC 2822.

Reference: p. 360

13. _____ depend on the ability of mail servers to store messages.

a. Senders

b.  Receivers

Reference: p. 360

14. An e-mail user receiving messages from their mail server might use:

a. the IMAP standard.

b. the POP standard.

c. either the IMAP or POP standard.

d. the SMTP standard.

Reference: p. 360

15. If you are using a Web-enabled e-mail system:

a. all of your incoming and outgoing messages must be composed using HTML.

b. you have to install a special Web-enabled e-mail client to access your e-mail.

c. you access and send mail using a Web browser.

d. you are more likely to be susceptible to viruses being introduced on your computer.

e. you are unable to send/receive e-mail messages containing information other than letters or numbers.

Reference: p. 361

16. _____ is a standard to describe the format of file attachments in e-mail.

a. RFC 2822

b. SMTP

c. HTML

d. MIME

Reference: p. 363

17. HTTP is used at the ______layer.

a. Physical

b. Data Link

c. Application

d. Internet

e. Transport

Reference: pp. 354 and 363

18. Which of the following is used to retrieve Web pages?

a. HTTP

b.  HTML

Reference: p. 362

19. How many HTTP request-response cycles are needed to transfer a Web page containing 88 lines of text and 3 different images?

a. 1

b. 3

c. 4

d. 88

e. 91

Reference: p. 363

20. Which of the following is NOT normally a component of an e-commerce system?

a. A file server

b. An Internet site

c. A multiplexer

d. Customer relationship management system

e. A firewall

Reference: p. 364-366

21. It is normal for e-commerce systems to connect to other organizations to perform related tasks such as credit card processing.

a. True

b.  False

Reference: p. 365

22. Application servers _____.

a. interact with users

b. store the data the user wishes to have

c. Both of the above.

d. Neither a. nor b.

Reference: p. 366

23. Application servers normally interact with database servers using _____.

a. API

b. SMTP

c. LDAP

d. MIME

Reference: p. 367

24. SSL security is implemented at the ______layer.

a. Physical

b. Internet

c. Transport

d. Data link

e. Application

Reference: p. 367

25. A hardened server refers to a server that:

a. is hard to reach because it exists inside of a firewall.

b. is protected from physical problems such as power outages and water leakage.

c. is protected against attacks from hackers.

d. is not connected to the Internet but is only reachable through an intranet.

e. has been temporarily saturated with traffic.

Reference: p. 368

26. It is a good idea to place webserver to server external customers in a DMZ.

a. True

b.  False

Reference: p. 367

27. Most basic web services communicate using:

a. the first available unused port.

b. the first available port number above 1023.

c. the first available port number below 1023.

d. Port 25.

e. Port 80.

Reference: p. 371

28. SOAP messages _____.

a. are created using the XML syntax

b. usually are delivered via HTTP

c. Both of the above.

d. Neither a. nor b.

Reference: p. 370

29. The UDDI protocol is useful for:

a. allowing Web services to advertise themselves to potential users.

b. scanning incoming HTTP requests for viruses and other hacker-related mischief.

c. detecting whether a server is being scanned by a potential hacker.

d. rerouting e-commerce traffic to alternative servers when the requested server is busy.

e. tracing the source of an incoming e-commerce service request.

Reference: p. 371

30. Which of the following is considered a bigger problem with traditional client/server based architectures than with peer-to-peer architectures?

a. Processing control at the client’s PC

b. The likelihood of traffic congestion at a client’s PC

c. Underutilized processing capacity of client PCs

d. Potential that essential data/services could become unavailable as a device is turned off

Reference: p. 373

31. To be considered a peer-to-peer application architecture, there can be no dedicated servers included on the network.

a. True

b.  False

Reference: p. 373

32. Which of the following uses servers?

a. Gnutella

b. Napster

c. Both of the above.

d. Neither a. nor b.

Reference: p. 374-375

33. What important standard governs videoconferencing and IP telephony?

a. DHCP

b. H.323

c. SMTP

d. V.IP

e. SNMP

Reference: p. 375

34. Two users communicating directly with each other using IP telephony is a good example of a peer-to-peer networked application.

a. True

b.  False

Reference: p. 376

35. Which of the following takes advantage of idle user PC processing capacity?

a. Napster

b. SETI@home

c.  H.323

Reference: p. 377

8