Chapter 6 & 7 Flashcards
What kind of message architecture supports all TCP/IP application layer protocols and services?
a. Client/server
b. peer-to-peer
c. request/reply
d. push-pull
c. request/reply
When the TCP/IP host that initiats contact with another TCP/IP host nearly always makes requests, and the contacted host invariably reponds to those requests, what kind of relationship exists between those host for that service?
a. Client/server
b. peer-to-peer
c. request/reply
d. push-pull
a. client/server
When a TCP/IP host can initiate contact with another TCP/IP host to make a request for service, but the other host can turn around and do the same thing, what kind of relationship exsits between those hosts for that service?
a. Client/server
b. peer-to-peer
c. request/reply
d. push-pull
b. peer-to-peer
When two servers want to exchange data, and the sending host originates the transfer of data to the receiver, what is this kind of transfer operation called?
a. pull
b. push
c. push-pull
d. store and forward
b. push
When two servers can exchange data, and the sender initiates transfer to the receiver once data changes occur, but the receiver periodically initiates transfers, what is this kind of transfer called?
a. pull
b. push
c. push-pull
d. store and forward
c. push-pull
Which two advantages are derived immediately when replicating data across multiple servers?
a. backup and recovery
b. availability
c. redundancy
d. robustness
b. availability
d. robustness
Which form of FTP client operates as a popular, standalone software application?
a. command-line FTP program
c. embedded FTP code
c. Web-based FTP access
d. graphical FTP program
d. graphical FTP program
Which software component on an FTP server handles incoming user commands?
a. command interpreter
b. protocol interpreter
c. runtime library
d. user interface
b. protocol interpreter
Telnet supports only unidirectional, byte-oriented communications. True or false?
false
Telnet passes account names and passwords in clear text from the local host to the remote host. True or False?
true
Which of the following statements best describes the sender-SMTP process?
a. sends reply codes, including responses to codes and mail messages sent
b. forwards e-mail messages from one server to another
c. sends mail commands and mail messages
d. tracks delivery and reception of all mail messages sent.
c. sends mail commands and mail messages
Which of the following statements best describes the receiver-SMTP process?
a. sends responses to all mail messages received.
b. sends reply codes, including responses to codes and mail messages sent.
c. forwards e-mail messages from one server to another
d. sends mail commands and mail messages
b. sends reply codes, including responses to codes and mail messages sent.
A store and forward email system stores all inbound messages destined for local clients and forwards all inbound messages destined for clients on other email servers. True or False?
True
The generic named used to identify a Web resource is a:
a. Uniform Resource locator (URL)
b. Uniform Resource Name (URN)
c. Uniform Resource Identifier(URI)
d. Universal Naming convention(UNC)
c. Uniform Resource Identifier (URI)
The abbreviation for the secure implementation of HTTP is called:
a. SHTTP
b. HTTPS
c. SSL
d. SSH
b. HTTPS
Which of the following ongoing connections does FTP maintain during an active session? (Choose all that apply)
a. session connection
b. client connection
c. command connection (port 21)
d. server connection
e. data connection (port 20)
c. command connection
e. data connection
Which of the following basic TCP/IP services responds to a service request with an arbitrary stream of characters?
a. Finger
b. echo
c. chargen
d. QOD
e. whois
c. chargen
Which of the following basic TCP/IP services can provide information about registered domain names?
a. Finger
b. echo
c. chargen
d. QOD
e. whois
e. Whois
Which of the following basic TCP?IP utilities is not included in Simple TCP/IP Services in windows 2000 and Windows XP?
a. Echo
b. Chargen
c. QOD
d. Whois
a. echo
b. chargen
Why is Finger so soldom available to users of most internet servers?
a. It’s no longer needed
b. it’s no longer popular
c. it proved to be vulnerable to security exploits
d. The term has an unpleasant connotation under some circumstances
c. it proved to be vulnerable to security exploits
RPC provides a standard mechanism to create custom distributed applications over TCP/IP. True/False?
True
An SNMP agent must be present on a host or device for it to report to a remote management console. True or false?
True
NetBIOS over TCP/IP is required on any networks that include versions of Windows older than Windows 2000, no matter what protocols are in use. True or False?
false
Which of the following statements best explains the importance of data offset values when decoding Application layer protocols?
a. Those values pinpoint the location of key fields, such as application layer header information.
b. Those values allow the contents of the payload to be inspected at will.
c. Those values determine where key fields start and stop
d. Those values determine how the Application layer payload should be interpreted.
c. Those values determine where key fields start and stop
File with information on DNS root servers, that should be pre-loaded on any DNS server.
named.root
What method of name resolution was used on the internet prior to the introduction of DNS?
a. dynamic name resolution
b. static name resolution
c. active name resolution
d. passive name resolution
b. static name resolution
What is the name of the file that contains name-to-IP address mapping information for Windows and Linux?
a. LMHOSTS
b. ZONEINFO
c. ROOT.dns
d. HOSTS
d. Hosts
What is the name of the most widely used DNS server implementation on the internet today?
a. EasyDNS
b. BIND
c. WinDNS
d. JEEVES
b. BIND (berkeley INternet Name Domain)
Which of the following characterize valid aspects of DNS? (choose all that apply)
a. local control over domain name database segments
b. designation of optional primary name servers and mandatory secondary name servers
c. data from all database segments, available everywhere
d. highly robust and available database information
e. requires implementation of a relational database management system, such as oracle or sybase
a. local control over domain name database segments
c. data from all database segments, available everywhere
d. highly robust and available database information
in the domain name hierarchy, all domains meet at the root. True or false?
True
Top-level domain names include two- and three-letter country codes, as well as organizational codes, such as .com, .edu, and .org. True or false?
true
What is the process whereby a DNS server higher in the domain name hierarchy confers responsibility for portions of the global DNS database to DNS servers lower in its hierarchy?
a. subordination of authority
b. database consolidation
c. delegation of authority
d. database segmentation
c. delegation of authority
Which DNS resource records allow use of the FQDNs for domain names? (choose all the apply)
a. A
b. SOA
c. PTR
d. MX
e. all of the above
a. A
c. PTR
Which DNS resource record is used to create aliases for domain names?
a. A
b. SOA.
c. PTR
d. MX
e. CNAME
e. CNAME
Which DNS resource record appears at the beginning of every DNS file?
a. A
b. SOA.
c. PTR
d. MX
e. CNAME
b. SOA
Which DNS resource record enable inverse lookups (also known as revers DNS lookups)?
a. A
b. SOA.
c. PTR
d. MX
e. CNAME
c. PTR
Which DNS resource record maps domain names to IP addresses?
a. A
b. SOA.
c. PTR
d. MX
e. CNAME
a. A
Any type of DNS server also can be a caching-only server. True of False?
True
What is the minimum and maximum number of primary database servers allowed in any single DNS database zone?
a. 1
b. 2
c. 4
d. 8
e. 16
a. 1
It is mandatory to have one or more secondary DNS servers for any DNS database zone. True or False?
true
What size or type of organizations are likely to benefit from a caching-only DNS server? (choose all that apply)
a. small
b. medium
c. large
d. service provider
c. large
d. service provider
What kinds of data are most likely to show up in a response to a DNS query of any kind?
a. address forwarding instructions
b. DNS resource records
c. address impersonation alerts
d. error messages
b. DNS resource records
d. error messages
Which of the following query sequences represents a typical DNS lookup?
a. iterative, then recursive
b. recursive, then iterative
c. static then dynamic
d. dynamic, then static
b. recursive, then iterative
Why do “all DNS queries end at the root?”
a. The root maintains a copy of the global DNS database
b. The root can access any and all authoritative name servers for any database segment
c. Any DNS server can access the root at any time
d. Multiple root servers prevent the root of domain name hierarchy from becoming bogged down with requests
b. the root can access any and all authoritative name servers for any database segment
When using NSLOOKUP, an authoritative response is:
a. explicitly labeled as such
b. available only if the authoritative name server is explicitly targeted for lookup
c. available only by request, using the ‘a option
d. implied by the absence of “non-authoritative response” in the reply.
d. implied by the absence of “non-authoritative response” in the reply
It is necessary to add resource records for the DNS root servers to the cache of any DNS server during initial configuration and setup. True of false?
true
One common name for presenting a false IP address or domain name when attempting illicit system entry or communications is;
a. IP masquerading
b. IP impersonation
c. IP spoofing
d. False IP credentials
c. IP spoofing
Because it is a predefined domain name and address pair, it is not necessary to create DNS files for the localhost and the loopback addresses 127.0.0.0 and 127.0.0.1. True of false
True