(完整版)计算机网络教程自顶向下方法选择题及答案Chapt2ApplicationLayer-QUIZZ.pdf
Chapter 2 Application Layer 1.In a client-server paradigm,a _ program provides services to a(another)_ program.A)client;client B)client;server C)server;client D)server;server 2.In a client-server paradigm A)both the server and the client must be running all the time.B)both the server and the client need to be running only when they are needed.C)the server must be running all the time but the client needs to be running only when it is needed.D)the client must be running all the time but the server needs to be running only when it is needed 3.The first section of a URL identifier is the _.A)protocol B)path C)host D)port 4.A _ document is a fixed-content document that is created and stored in a server.The client can get a copy of the document only.A)static B)dynamic C)active D)None of the choices are correct 5._ is a language for creating a static document.A)Extensible Style Language(XSL)B)Hypertext Markup Language(HTML)C)Extensible Markup Language(XML)D)All choices are correct 6.A _ document is created by a Web server whenever a browser requests the document.A)static B)dynamic C)active D)None of the choices are correct 7.For many applications,we need a program or a script to be run at the client site.These are called _ documents.A)static B)dynamic C)active D)None of the choices are correct 8.HTTP uses the services of _.A)UDP B)IP C)TCP D)DNS 9.In HTTP,the first line in a request message is called a _ line;the first line in the response message is called the _ line.A)request;response B)status;response C)status;status D)None of the choices are correct 10.In a _ connection,one TCP connection is made for each request/response.A)persistent B)nonpersistent C)persistent or a nonpersistent D)None of the choices are correct 11.In a _ connection,the server leaves the connection open for more requests after sending a response.A)persistent B)nonpersistent C)persistent or nonpersistent D)None of the choices are correct 12.In HTTP,_ server is a computer that keeps copies of responses to recent requests.A)a regular B)a proxy C)an auxiliary D)a remote 13.An HTTP request message always contains _.A)a header line and a body B)a request line and a header line C)a request line,a header line,and a body D)a request line,a header line,a blank line,and a body 14.Which of the following is present in both an HTTP request line and a status line?A)version number B)URL C)status code D)method 15.FTP uses the services of _.A)UDP B)IP C)TCP D)none of the choices are correct 16.In FTP,_ well-known port(s)is(are)used.A)one B)two C)three D)four 17.During an FTP session the control connection is opened _.A)once B)twice C)many times D)none of the choices are correct 18.During an FTP session the data connection may be opened _.A)only once B)only two times C)as many times as needed D)none of the choices are correct 19.In FTP,a file can be organized into records,pages,or a stream of bytes.These are types of an attribute called _.A)file types B)data structures C)transmission modes D)none of the choices are correct 20.In FTP,there are three types of _:stream,block,and compressed.A)file types B)data types C)transmission modes D)none of the choices are correct 21.In FTP,ASCII,EBCDIC,and image define an attribute called _.A)file type B)data structure C)transmission mode D)none of the choices are correct 22.In FTP,when we _,it is copied from the client to the server.A)retrieve a file B)store a file C)open a file D)none of the choices are correct 23.In the common scenario,the electronic mail system needs _.A)two UAs,two MTAs and one MAA B)two UAs,two MTAs and two MAAs C)two UAs,two pairs of MTAs and a pair of MAAs D)two UAs,two pairs of MTAs and a two pairs of MAAs 24._ provides service to the user to make the process of sending or receiving a message easier.A)An MTA B)An MAA C)A UA D)None of the choices are correct 25.An e-mail message contains the _ and the _.A)header;envelop B)header;body C)envelop;body D)None of the choices are correct 26.In the Internet,an e-mail address consists of two parts:a _ and a _.A)local part;domain name B)global part;domain name C)label;domain name D)local part;label 27._ is a supplementary protocol that allows non-ASCII data to be sent through e-mail.A)SMPT B)MPEG C)MIME D)POP 28.The formal protocol that defines the MTA client and server in the Internet is called _.A)SMTP B)SNMP C)TELNET D)SSH 29.SMTP is a _ protocol.A)pull B)push C)push and pull D)None of the choices are correct 30.The message access protocol is a _ protocol.A)pull B)push C)push and pull D)None of the choices are correct 31.In the _ encoding scheme,each 24 bits become four 6-bit chunks,and eventually are sent as 32 bits.A)8bit B)binary C)base64 D)quoted-printable 32.In the _ encoding scheme,a non-ASCII character is sent as 3 characters.A)8bit B)base64 C)quoted-printable D)binary 33.TELNET is an abbreviation for _.A)terminal network B)telephone network C)telecommunication network D)None of the choices are correct 34.When a user logs into a local time-sharing system,it is called _ login.A)local B)remote C)local or remote D)None of the choices are correct 35.When a user wants to access an application program or utility located on a remote machine,he or she performs _ login.A)local B)remote C)local or remote D)None of the choices are correct 36.Network Virtual Terminal(NVT)uses two sets of characters,one for _ and one for _.A)sending;receiving B)request;reply C)data;control D)None of the choices are correct 37.For data,NVT uses US ASCII characters with the highest order bit set to _.A)1 B)0 C)1 or 0 D)None of the choices are correct 38.For control,NVT uses US ASCII characters with the highest order bit set to _.A)1 B)0 C)1 or 0 D)None of the choices are correct 39.The _ translates local characters into NVT characters.A)terminal driver B)TELNET client C)TELNET server D)pseudoterminal driver 40.The _ translates NVT characters into a form acceptable by the remote operating system.A)terminal driver B)TELNET client C)TELNET server D)pseudoterminal driver 41.The _ component in the SSH provides confidentiality,integrity,authentication and compression.A)SSH Application B)SSH-AUTH C)SSH-CONN D)SSH-TRAN 42.Port forwarding is _.A)a protocol used to forward messages from one port to another port B)a procedure for changing an ephemeral port to a well-known port C)a service,provided by SSH,that creates a secure channel for applications that do not have security services.D)None of the choices are correct 43.In a _ name space,a name is a sequence of characters without structure.A)linear B)flat C)hierarchical D)organized 44.In a _ name space,each name is made of several parts.A)linear B)flat C)hierarchical D)organized 45.In the DNS,the names are defined in _ structure.A)a linear list B)an inverted-tree C)a three-dimensional D)None of the choices are correct 46.The root of the DNS tree is _.A)a string of 127 characters B)a string of 63 characters C)a string of 15 characters D)an empty string 47.In the domain name space,a full domain name is a sequence of labels separated by _.A)colons B)semicolons C)dots D)commas 48.In the domain name space,if a label is terminated by a null string,it is called a _.A)PQDN B)CQDN C)SQDN D)None of the choices are correct 49.In the domain name space,if a label is not terminated by a null string,it is called a _.A)FQDN B)PQDN C)SQDN D)None of the choices are correct 50.In the domain name space,a _ is a subtree of the domain name space.A)label B)name C)domain D)None of the choices are correct 51.In the domain name space,what a server is responsible for or has authority over is called a _.A)domain B)label C)zone D)None of the choices are correct 52.A _ server is a computer whose zone system consists of the whole tree.A)domain B)zone C)root D)primary 53.A _ server is a computer that stores a file about the zone for which it has an authority.A)primary B)secondary C)zone D)root 54.A _ server is a computer that transfers the complete information about a zone from another server.A)primary B)secondary C)zone D)root 55.In the Internet,the country domain section uses _ country abbreviations.A)two-character B)three-character C)four-character D)None of the choices are correct 56.In _ resolution,the resolver expects the server to supply the final answer.A)iterative B)recursive C)straight D)None of the choices are correct 57.In _ resolution,the server returns the IP address of the server that it thinks can resolve the query.A)iterative B)recursive C)straight D)None of the choices are correct 58.DNS can use the services of _.A)UDP B)TCP C)either UDP or TCP D)None of the choices are correct 59.A registrar,a commercial entity accredited by _ is responsible for adding new domains to DNS data base A)NIC B)ICANN C)ISOC D)IEFE 60.In a centralized P2P network,the directory system uses the _ paradigm;the storing and downloading of the files are done using _ paradigm.A)client-server;client-server B)peer-to-peer;client-server C)client-server;peer-to-peer D)peer-to-peer;peer-to-peer 61.Napster is an example of a _ peer-to-peer network A)centralized B)structured-decentralized C)unstructured-decentralized D)None of the choices are correct 62.Gnutella is an example of a _ peer-to-peer network A)centralized B)structured-decentralized C)unstructured-decentralized D)None of the choices are correct 63.BitTorrent is an example of a _ peer-to-peer network A)centralized B)structured-decentralized C)unstructured-decentralized D)None of the choices are correct 64.In a structured-decentralized P2P network,_.A)the directory system is kept in a center B)a query to find a file must be flooded through the network C)a pre-defined set of rules is used to link nodes so that a query can be effectively and efficiently resolved D)None of the choices are correct 65.In a DHT-based network,each peer A)has a partial knowledge about the whole network.B)has a complete knowledge about the whole network.C)only has a knowledge about its successor.D)None of the choices are correct 66.The finger table is the routing table used in _.A)Gnutella B)Pastry C)Kademlia D)None of the choices are correct 67.Which of the following is not a Chord interface.A)Lookup B)Fix node C)Stabilize D)Join 68.In _ a key is stored in a node whose identifier is numerically closest to the key.A)Chord B)Pastry C)Kademlia D)None of the choices are correct 69.To resolve a query,_ uses two entities:a routing table and a leaf set.A)Chord B)Pastry C)Kademlia D)None of the choices are correct 70.In Kademlia,the distance between the two identifiers(nodes or keys)are measured as the bitwise-_ between them.A)AND B)NOR C)OR D)None of the choices are correct 71.In _,nodes and data items are m-bit identifiers that create an identifier space of 2m points distributed at the leaves of a binary tree A)Chord B)Pastry C)Kademlia D)None of the choices are correct 72.In Kademlia,each node in the network divides the binary tree into m subtrees that.A)include the node itself B)do not include the node itself C)include the node itself and the successor node D)None of the choices are correct 73.Trackerless BitTorrent uses _ DHT to do the job of tracking.A)Chord B)Pastry C)Kademlia D)None of the choices are correct CCAAD BCCDB ABBAC BACBC ABCCB ACABA CCAAB CBABC DCBCB CCDBC CCABA BACBC ACBCA DBBBD CBC