Client Server Application Flashcards

1
Q

What are the resources a network makes available to its users?

A

Application & data provided by application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the resources a network makes available to its users is collectively referred to as _________ ________.

A

network services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

applications, which involve two computers, are known as ______ ______ ____________.

A

client-server applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the process of client server applications, the first computer _________ or a service from the second computer, the _______.

A

requests data , server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a web ________ requests a web page from a web _______; the web server returns the requested data to the _______.

A

web browser, web server, client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

web browser is also known as the ______ __________.

A

client application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

web server is also known as the ______
________.

A

server application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

network devices use methods and rules for communication known as ________.

A

protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s the process to handle the request for a web page?

A
  • client computer must find web server.
  • when client finds server, they must agree on protocols for means of communication.
  • Client makes request and server responds by sending web page.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is all involved in the process to handle the request of a web page?

A

-Hardware
-OS
-applications on both computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the ________ on a network are able to communicate with each other via the ________ they have in common.

A

computers, protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

two primary protocols are . . .

A

-TCP (Transmission Control Protocol)
-IP (Internet Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the suite of all the protocols an OS uses for communication on a network is the _________.

A

TCP/IP suite of protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 6 servers popular client-server applications and their protocols used on networks and the internet?

A

Web service
FTP Service (File Transfer Protocol)
Remote Applications
Remote Desktop
SMTP (Simple Mail Transfer Protocol)
Telnet Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Web service: a ___ ______ serves up web pages to clients.

A

Web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Many ____________ have their own web servers, which are available _________ on the corporate network.

A

Corporations, privately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Other web servers are _______, accessible from anywhere on the internet.

A

Public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What’s the primary protocol used by web servers and browsers? (clients)

A

HTTP (HyperText Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When HTTP is layered on top of an encryption protocol, such as SSL (Secure Sockets Layer) or TLS (Transport Layer Security), the result is ______ (_________), which gives secure transmission.

A

HTTPS (HTTP Secure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The most popular web server application is ?

A

Apache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What systems does the most popular web server primarily runs on?

A

UNIX systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What’s the second most popular web server application ?

A

IIS (Internet Information Services)

23
Q

Which Operating system is IIS embedded in?

A

Windows Server Operating system.

24
Q

To verify that a web based transmission is secure, look for _____ in the URL in the browser address box, as in ____://www.wellsfargo.com

25
What is a email?
A client server application that involves two servers.
26
What does the client use to send an email message?
SMTP (Simple Mail Transfer Protocol)
27
In an email, why does the client use STMP?
To send an email message to the first server, which is sometimes called the STMP server.
28
In an email, what happens after the client sends an email message to the first server?
The SMTP server sends the email message on to the receiver’s mail server, where it’s stored until the recipient requests delivery.
29
In an email, what happens when the recipient requests delivery?
The recipients mail server delivers the message to the receiving client using one of two protocols: POP3 (Post Office Protocol, V3) or IMAP4 (Internet Message Access Protocol, Version 4).
30
Using POP3, email is ____________ to the client computer.
Downloaded
31
Using IMAP4, the client application_______ the email while it’s stored on the server.
Manages
32
An example of a popular email server application is _________ ________ Server.
Microsoft Exchange Server
33
Outlook, an application in the Microsoft Office suite of applications, is a popular______ ______ application.
Email, client
34
SMTP is used to?
Send email to recipient’s email server
35
What is POP3 and IMAP4 used for
Used by the client to receive email
36
FTP is a client server application that ?
Transfers files between two computers
37
FTP primarily uses ?
FTP (File Transfer Protocol)
38
What’s the downside to FTP?
FTP does not provide encryption and is, therefore, not secure.
39
What are the two types of FTP Clients?
Web browsers (can be FTP clients), dedicated FTP client applications
40
What’s a encrypted and secure file transfer protocol called?
SFTP (Secure File Transfer Protocol)
41
What is SFTP based on?
Based on the SSH Protocol
42
Telnet Service is
Telnet protocol is used by the telnet client server command-line application to allow an administrator or other user to “remote in” or control a computer remotely.
43
Transmissions in Telnet are not ____________, which has caused Telnet to be largely replaced by other, more secure programs, such as the ___ command in the Linux operating system.
Encrypted , ssh
44
A ssh command in Linux uses the ____ protocol, which creates a secure channel or tunnel between two computers.
SSH (Secure Shell) protocol
45
A remote application is an
Application that is installed and executed on a server and is presented to a user working at a client computer.
46
Windows server 2008 and later versions include Remote Desktop services to ?
manage remote applications and versions of windows server prior to 2008 provided terminal services.
47
What does Windows Server 2008 and later versions both do ?
Both use RDP (Remote Desktop Protocol) to present the remote application and it’s data to the client.
48
Why are remote applications becoming popular?
Because most of the computing power (memory and cpu speed) and technical support (for application installations and updates and for backing up data) are focused on the server in a centralized location, which means the client computer require less computing power and desk-side support.
49
In windows operating systems, why does the Windows Remote Desktop application use RDP (Remote Desktop Protocol)?
To provide secure, encrypted transmissions that allow a technician to remote in— to access a remote computer from the technician’s local computer.
50
When a vendor supports software on your corporate network, the vendors support technician at the vendor’s site can use…
Remote Desktop to connect to a computer on your corporate network and troubleshoot problems with the vendor’s software.
51
The corporate computer serves up its Windows desktop from which the technician can access any resources on your ________ _________. In this situation, the vendor’s computer is running ______ ________ as a client and the corporate computer is running Remote Desktop as a ______ or host.
Corporate Network, Remote Desktop, Server
52
Using Remote Desktop you can access the desktop of the _______ ________ on your local _________.
Remote computer ,computer
53
Because they can be accessed from outside the local network, remote access servers necessitate _____ __________ _______.
Strict Security measures
54
You can think of applications and their data as the _________ traveling on a network and the operating systems as the ________ controllers managing the traffic. The _____ _______ itself is the hardware on which traffic flows.
Payload, traffic, road system