Client Server Application Flashcards

1
Q

What are the resources a network makes available to its users?

A

Application & data provided by application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the resources a network makes available to its users is collectively referred to as _________ ________.

A

network services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

applications, which involve two computers, are known as ______ ______ ____________.

A

client-server applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the process of client server applications, the first computer _________ or a service from the second computer, the _______.

A

requests data , server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a web ________ requests a web page from a web _______; the web server returns the requested data to the _______.

A

web browser, web server, client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

web browser is also known as the ______ __________.

A

client application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

web server is also known as the ______
________.

A

server application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

network devices use methods and rules for communication known as ________.

A

protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s the process to handle the request for a web page?

A
  • client computer must find web server.
  • when client finds server, they must agree on protocols for means of communication.
  • Client makes request and server responds by sending web page.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is all involved in the process to handle the request of a web page?

A

-Hardware
-OS
-applications on both computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the ________ on a network are able to communicate with each other via the ________ they have in common.

A

computers, protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

two primary protocols are . . .

A

-TCP (Transmission Control Protocol)
-IP (Internet Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the suite of all the protocols an OS uses for communication on a network is the _________.

A

TCP/IP suite of protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 6 servers popular client-server applications and their protocols used on networks and the internet?

A

Web service
FTP Service (File Transfer Protocol)
Remote Applications
Remote Desktop
SMTP (Simple Mail Transfer Protocol)
Telnet Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Web service: a ___ ______ serves up web pages to clients.

A

Web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Many ____________ have their own web servers, which are available _________ on the corporate network.

A

Corporations, privately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Other web servers are _______, accessible from anywhere on the internet.

A

Public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What’s the primary protocol used by web servers and browsers? (clients)

A

HTTP (HyperText Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When HTTP is layered on top of an encryption protocol, such as SSL (Secure Sockets Layer) or TLS (Transport Layer Security), the result is ______ (_________), which gives secure transmission.

A

HTTPS (HTTP Secure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The most popular web server application is ?

A

Apache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What systems does the most popular web server primarily runs on?

A

UNIX systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What’s the second most popular web server application ?

A

IIS (Internet Information Services)

23
Q

Which Operating system is IIS embedded in?

A

Windows Server Operating system.

24
Q

To verify that a web based transmission is secure, look for _____ in the URL in the browser address box, as in ____://www.wellsfargo.com

A

https

25
Q

What is a email?

A

A client server application that involves two servers.

26
Q

What does the client use to send an email message?

A

SMTP (Simple Mail Transfer Protocol)

27
Q

In an email, why does the client use STMP?

A

To send an email message to the first server, which is sometimes called the STMP server.

28
Q

In an email, what happens after the client sends an email message to the first server?

A

The SMTP server sends the email message on to the receiver’s mail server, where it’s stored until the recipient requests delivery.

29
Q

In an email, what happens when the recipient requests delivery?

A

The recipients mail server delivers the message to the receiving client using one of two protocols: POP3 (Post Office Protocol, V3) or IMAP4 (Internet Message Access Protocol, Version 4).

30
Q

Using POP3, email is ____________ to the client computer.

A

Downloaded

31
Q

Using IMAP4, the client application_______ the email while it’s stored on the server.

A

Manages

32
Q

An example of a popular email server application is _________ ________ Server.

A

Microsoft Exchange Server

33
Q

Outlook, an application in the Microsoft Office suite of applications, is a popular______ ______ application.

A

Email, client

34
Q

SMTP is used to?

A

Send email to recipient’s email server

35
Q

What is POP3 and IMAP4 used for

A

Used by the client to receive email

36
Q

FTP is a client server application that ?

A

Transfers files between two computers

37
Q

FTP primarily uses ?

A

FTP (File Transfer Protocol)

38
Q

What’s the downside to FTP?

A

FTP does not provide encryption and is, therefore, not secure.

39
Q

What are the two types of FTP Clients?

A

Web browsers (can be FTP clients),
dedicated FTP client applications

40
Q

What’s a encrypted and secure file transfer protocol called?

A

SFTP (Secure File Transfer Protocol)

41
Q

What is SFTP based on?

A

Based on the SSH Protocol

42
Q

Telnet Service is

A

Telnet protocol is used by the telnet client server command-line application to allow an administrator or other user to “remote in” or control a computer remotely.

43
Q

Transmissions in Telnet are not ____________, which has caused Telnet to be largely replaced by other, more secure programs, such as the ___ command in the Linux operating system.

A

Encrypted , ssh

44
Q

A ssh command in Linux uses the ____ protocol, which creates a secure channel or tunnel between two computers.

A

SSH (Secure Shell) protocol

45
Q

A remote application is an

A

Application that is installed and executed on a server and is presented to a user working at a client computer.

46
Q

Windows server 2008 and later versions include Remote Desktop services to ?

A

manage remote applications and versions of windows server prior to 2008 provided terminal services.

47
Q

What does Windows Server 2008 and later versions both do ?

A

Both use RDP (Remote Desktop Protocol) to present the remote application and it’s data to the client.

48
Q

Why are remote applications becoming popular?

A

Because most of the computing power (memory and cpu speed) and technical support (for application installations and updates and for backing up data) are focused on the server in a centralized location, which means the client computer require less computing power and desk-side support.

49
Q

In windows operating systems, why does the Windows Remote Desktop application use RDP (Remote Desktop Protocol)?

A

To provide secure, encrypted transmissions that allow a technician to remote in— to access a remote computer from the technician’s local computer.

50
Q

When a vendor supports software on your corporate network, the vendors support technician at the vendor’s site can use…

A

Remote Desktop to connect to a computer on your corporate network and troubleshoot problems with the vendor’s software.

51
Q

The corporate computer serves up its Windows desktop from which the technician can access any resources on your ________ _________. In this situation, the vendor’s computer is running ______ ________ as a client and the corporate computer is running Remote Desktop as a ______ or host.

A

Corporate Network, Remote Desktop, Server

52
Q

Using Remote Desktop you can access the desktop of the _______ ________ on your local _________.

A

Remote computer ,computer

53
Q

Because they can be accessed from outside the local network, remote access servers necessitate _____ __________ _______.

A

Strict Security measures

54
Q

You can think of applications and their data as the _________ traveling on a network and the operating systems as the ________ controllers managing the traffic. The _____ _______ itself is the hardware on which traffic flows.

A

Payload, traffic, road system