Читайте также: |
|
Application level performance is typically higher in networks with _____ latency and _____ bandwidth.
(a) high, low
(b) high, high
(c) low, low
(d) low, high
Item-level feedback: See section 1.1.3, subsection "Basic Network Performance Metrics," in the course notes.
Multicast communication generally refers to data that is
(a) sent from several hosts to one host simultaneously
(b) relayed through multiple routers
(c) relayed through multiple bridges
(d) sent from one host to several hosts simultaneously
Item-level feedback: See section 1.1.3, subsection "Other Application Metrics," in the course notes.
Socket-level programming typically involves
(a) programming hardware
(b) registries and interface definitions for exchanging data
(c) wiring routers and bridges to send and receive calls
(d) explicit send and receive calls to exchange data
Item-level feedback: See section 1.1.2 in the course notes.
The Internet Protocol (IP) defines the _____ layer of the Internet protocol stack.
(a) application
(b) transport
(c) physical
(d) network
Item-level feedback: See section 1.1.4, subsection "What Makes the Internet Work?" in the course notes.
The term packetization refers to the process of
(a) reassembling network packets for consumption by an application
(b) using a digital instead of an analog transmission medium
(c) using an analog instead of a digital transmission medium
(d) splitting a message into fragments for network transmission
Item-level feedback: See section 1.1.1, subsection "How Application Messages Are Transmitted," in the course notes.
6. Which of the following statements is (are) true of network protocols?
I. A protocol is a set of rules that facilitate communication among network applications.
II. Only a single protocol may govern any transmission.
(a) II only
(b) I and II
(c) None
(d) I only
Item-level feedback: See section 1.1.1, subsection "Web Browsers and Servers: Network Applications," in the course notes.
7. Typically, a network protocol specifies which of the following?
I. A message format
II. Rules for establishing and terminating communication sessions
(a) I only
(b) II only
(c) None
(d) I and II
Item-level feedback: See section 1.1.1, subsection "Web Browsers and Servers: Network Application," in the course notes.
8. Which of the following is a protocol used for communication between a web server and a web browser?
(a) FTP
(b) Telnet
(c) World Wide Web (www)
(d) HTTP
Item-level feedback: See section 1.1.1, subsection "Other Applications," in the course notes.
9. Which of the following is a disadvantage of connection-based protocols?
(a) Unreliable connections
(b) High error rates
(c) Small MTU sizes
(d) High startup costs
Item-level feedback: See section 1.1.1, subsection "How Application Messages Are Transmitted," in the course notes.
10. On a network, the term authentication typically refers to the process of
(a) ensuring that users remain anonymous
(b) ensuring that packets sent through the Internet cannot be intercepted
(c) computing the checksum of packets
(d) verifying the identity of a sender or receiver
Item-level feedback: See section 1.1.3, subsection "Other Application Metrics," in the course notes.
11. Which of the following is the network-layer protocol of the Internet?
(a) HTTP
(b) Telnet
(c) Ethernet
(d) IP
Item-level feedback: See section 1.1.4, subsection "What Makes the Internet Work," in the course notes.
12. In which of the following types of routing algorithms does every router maintain information about the complete network topology?
I.Link state
II.Distance Vector
(a) II only
(b) I and II
(c) None
(d) I only
Item-level feedback: See section 1.3.2, subsection "Basic Routing Protocols and Algorithms," in the course notes.
13. Which of the following types of traffic occur in intra-domain routing?
I. Local
II. Transit
III. External
(a) I and II only
(b) I and III only
(c) II and III only
(d) I, II, and III
Item-level feedback: See section 1.3.2, subsection "Hierarchical Routing," in the course notes.
14. The process of setting up routers to exchange connectivity information with each other is called
(a) transit mapping
(b) reverse path forwarding
(c) piggybacking
(d) Peering
Item-level feedback: See section 1.3.2, subsection "Routing in the Real World," in the course notes.
15. Which of the following was designed to solve the problem of IP address space fragmentation?
(a) Maximum Transfer Unit
(b) Simple Network Management Protocol
(c) Peering
(d) Classless Inter Domain Routing
Item-level feedback: See section 1.3.3, subsection "Classless Inter Domain Routing," in the course notes.
16. Which of the following IP header fields provide simple error detection?
(a) Fragmentation
(b) Time to live
(c) Type of service
(d) Checksum
Item-level feedback: See section 1.3.4, subsection "Internet Protocol Functionality," in the course notes.
17. Which of the following maps IP addresses onto datalink addresses?
(a) Domain Name System (DNS)
(b) Simple Network Management Protocol (SNMP)
(c) Classless Inter Domain Routing (CIDR)
(d) Address Resolution Protocol (ARP)
Item-level feedback: See section 1.3.5, subsection "Summary," in the course notes.
18. Consider an application running on host cs.cmu.edu that wants to send a packet to host ee.cmu.edu. Assuming no information is cached, the send request on cs.cmu.edu will cause which of the following events to happen first?
(a) An ARP lookup
(b) The packet is sent to the first router.
(c) Host cs.cmu.edu performs an SNMP server query.
(d) A DNS lookup
Item-level feedback: See section 1.3.5, subsection "Example," in the course notes.
19. Which of the following can be used by a router to report a dropped packet to the packet's sender?
(a) Simple Network Management Protocol (SNMP)
(b) Border Gateway Protocol (BGP)
(c) Dynamic Host Configuration Protocol (DHCP)
(d) Internet Control Message Protocol (ICMP)
Item-level feedback: See section 1.3.6, subsection "Internet Control Message Protocol," in the course notes.
20. Which of the following is typically used to monitor the operation of network routers and switches?
(a) Internet Control Message Protocol (ICMP)
(b) Border Gateway Protocol (BGP)
(c) Dynamic Host Configuration Protocol (DHCP)
(d) Simple Network Management Protocol (SNMP)
Item-level feedback: See section 1.3.6, subsection "Network Management," in the course notes.
21. Which of the following IP header fields is designed to prevent a packet from remaining indefinitely in a routing loop?
(a) Checksum
(b) Length
(c) Fragmentation
(d) Time to live
Item-level feedback: See section 1.3.4, subsection "Internet Protocol Functionality," in the course notes.
22. Which of the following allows a host to be assigned an IP address automatically?
(a) The simple network management protocol (SNMP)
(b) The domain name system (DNS)
(c) The address resolution protocol (ARP)
(d) The dynamic host configuration protocol (DHCP)
Item-level feedback: See section 1.3.6, subsection "Host Configuration," in the course notes.
23. Which of the following network exploration tools can be used to determine information about possible paths between one network host and another?
(a) Ping
(b) Netstat
(c) Nslookup
(d) Traceroute
Item-level feedback: See section 1.3.7, subsection "Traceroute," in the course notes.
24. Forcing a packet to be routed through specific network routers by appending an additional header to the packet is commonly known as
(a) forwarding
(b) encapsulation
(c) embedding
(d) tunneling
25. The throughput of a transmission medium is limited by which of the following factors?
I. The width of the available frequency spectrum
II. The effects of noise and attenuation
III. The number of encoding levels in the signal
(a) I only
(b) II and III only
(c) I and III only
(d) I, II, and III
Item-level feedback: See section 1.2.1, subsection "Transmission," in the course notes.
26. Compared to the wired transmission, wireless transmission typically has _____ attenuation and _____ maximum distance.
(a) higher, longer
(b) lower, shorter
(c) lower, longer
(d) higher, shorter
Item-level feedback: See section 1.2.1, subsection "Transmission," in the course notes.
27. If the datalink layer uses special start characters and end characters to mark the boundary of a frame, these special characters must be _____ inside the frame.
(a) repeated
(b) synchronized
(c) dropped
(d) escaped
Item-level feedback: See section 1.2.2, subsection "Framing," in the course notes.
28. Which of the following features of Ethernet has not remained constant since the advent of the technology?
(a) Protocol header format
(b) Protocol addressing
(c) Use of CSMA-CD control
(d) Transmission bandwidth
Item-level feedback: See section 1.2.4, subsection "The Ethernet Family," in the course notes.
29. A Digital Subscriber Line (DSL) is a _____ network that uses a _____ topology.
(a) broadcast-based, star
(b) broadcast-based, ring
(c) switch-based, ring
(d) switch-based, star
Item-level feedback: See section 1.2.5, subsection "Home Connectivity Over the Years," in the course notes.
30. Which of the following is offered by both Serial Line IP (SLIP) and Point-to-Point Protocol (PPP)?
(a) Reliable transmission
(b) Authentication
(c) Choice of layer 3 protocols
(d) Flow control
Item-level feedback: See section 1.2.5, subsection "Datalink Protocols," in the course notes.
31. In cell-based wireless networks, the MAC protocol inside the cells is typically
(a) switch-based
(b) packet-based
(c) stream-based
(d) broadcast-based
Item-level feedback: See section 1.2.6, subsection "Wireless cells," in the course notes.
32. Which of the following is (are) true of local area wireless networks?
I. They are typically based on cells using point-to-point media links.
II. Two wireless hosts can be within transmission range of the base station but out of range of each other.
III. They have higher roundtrip delays than similar wired networks.
(a) I only
(b) I and III only
(c) II and III only
(d) II only
Item-level feedback: See section 1.2.6, subsection "Local, Metropolitan, and Wide Area Wireless Communication," in the course notes.
33. User Datagram Protocol (UDP) uses which of the following for optional error detection?
(a) Odd parity check
(b) Message-digest fingerprint
(c) Cyclic redundancy check
(d) One's complement sum
Item-level feedback: See section 2.1.2, subsection "User Datagram Protocol (UDP)," in the course notes.
34. Which of the following internet applications typically transmit(s) packets over Transmission Control Protocol (TCP)?
I. FTP client
II. Audio streaming
III. Web browser
(a) I, II, and III
(b) II only
(c) I and II only
(d) I and III only
Item-level feedback: See section 2.1.2, subsection "User Datagram Protocol (UDP) and 2.1.3#Transmission Control Protocol (TCP)," in the course notes.
35. Which of the following transport protocol functions is (are) typically implemented for audio streaming?
I. End-to-end flow control
II. Error control
III. Congestion control
(a) II and III only
(b) I, II, and III
(c) I and III only
(d) II only
Item-level feedback: See section 2.1.5, subsection "An Example: Audio Streaming," in the course notes.
36. Consider the transport protocols for audio streaming applications. Which of the following is used to improve the quality of audio output with variable network delays?
(a) Random packet dropping
(b) Forward error correction
(c) Fixed rate sampling
(d) Silent period adjustment
Item-level feedback: See section 2.1.5, subsection "An Example: Audio Streaming," in the course notes.
37. In Transmission Control Protocol (TCP), network traffic sources can dynamically increase transfer rate over time by
(a) sniffing
(b) buffering
(c) piggybacking
(d) probing
Item-level feedback: See section 2.1.4, subsection "Congestion Control: Open-Loop and Closed-Loop," in the course notes.
38. In order to maintain network stability while Transmission Control Protocol (TCP) probes for additional bandwidth, rate increases are _____, and rate decreases are _____.
(a) multiplicative, additive
(b) additive, additive
(c) multiplicative, multiplicative
(d) additive, multiplicative
Item-level feedback: See section 2.1.4, subsection "Congestion Control: Open-Loop and Closed-Loop," in the course notes.
39. Network clients use well-known _____ numbers to contact well-defined network services, such as Telnet and DNS servers.
(a) accept
(b) connect
(c) listen
(d) port
Item-level feedback: See section 2.2.1, subsection "Establishing connections," in the course notes.
40. Which of the following is a standard that a network program can use to specify the type of a transmitted document?
(a) Internet Assigned Numbers Authority (IANA)
(b) Transmission Control Protocol (TCP)
(c) Internet Protocol (IP)
(d) Multipurpose Internet Mail Extensions (MIME)
Item-level feedback: See section 2.2.2, subsection "MIME," in the course notes.
41. Which of the following distributed-computing frameworks represents client-server interactions as simple function invocations?
(a) Transmission Control Protocol (TCP)
(b) Multipurpose Internet Mail Extensions (MIME)
(c) User Datagram Protocol (UDP)
(d) Remote Procedure Call (RPC)
Item-level feedback: See section 2.2.3, subsection "Motivation," in the course notes.
42. In video-streaming applications, per-frame compression exploits _____ redundancy in the data, whereas inter-frame compression exploits _____ redundancy in the data.
(a) temporal, spatial
(b) visual, auditory
(c) auditory, visual
(d) spatial, temporal
Item-level feedback: See section 2.2.4, subsection "Application Properties, 2.2.4#Application Properties," in the course notes.
43. A client program that makes a remote procedure call (RPC) uses a call to a(n) _____ instead of contacting the RPC server directly.
(a) skeleton routine
(b) RMI server
(c) NFS server
(d) stub routine
Item-level feedback: See section 2.2.3, subsection "Analysis of an RPC," in the course notes.
44. In a remote procedure call (RPC) framework, the _____ is responsible for converting typed parameters into byte strings that can be transmitted over a network.
(a) client programmer
(b) RPC server
(c) operating system
(d) stub routine
Item-level feedback: See section 2.2.3, subsection "Analysis of an RPC," in the course notes.
45. In network Quality of Service (QoS), which of the following does the traditional best-effort Internet service model guarantee?
I. Packet delivery
II. Latency limit
III. Bandwidth
(a) I and II only
(b) II and III only
(c) I and III only
(d) None
Item-level feedback: See section 2.3.1, subsection "Beyond The "Best Effort" Service Model," in the course notes.
46. In an integrated services model, which of the following is (are) necessary in order to provide network Quality of Service (QoS) guarantees?
I. Admission control
II. Traffic enforcement
(a) I only
(b) II only
(c) None
(d) I and II
Item-level feedback: See section 2.3.1, subsection "Toward An Integrated Services Model," in the course notes.
47. In an integrated services network, in order to offer Quality of Service (QoS), a packet classifier is required to
(a) determine the source and destination port numbers
(b) determine the source and destination IP address
(c) identify the signaling protocol that the packet is using
(d) identify the type of the flow to which the packet belongs
Item-level feedback: See section 2.3.1, subsection "Toward An Integrated Services Model," in the course notes.
48. In an integrated services network, it is necessary to have a traffic enforcement mechanism to ensure that
(a) the bandwidth shared among organizations is divided equally
(b) each router is handling a reasonable workload
(c) excess Quality of Service (QoS) requirements are denied
(d) applications do not exceed their agreed transmission rate
Item-level feedback: See section 2.3.1, subsection "Toward An Integrated Services Model," in the course notes.
49. Traditional First-In First-Out (FIFO) packet schedulers are insufficient for offering Quality of Service (QoS) guarantees in an integrated services network because the schedulers typically
(a) give audio and video packets high priority
(b) use different buffers to store packets for different users
(c) split bandwidth equally among all users
(d) treat all packets with the same priority
Item-level feedback: See section 2.3.2, subsection "Fair Queuing Packet Scheduling," in the course notes.
50. In Quality of Service (QoS) networks, a fair queuing (FQ) scheduler typically consists of a _____ and a(n) _____.
(a) real-time scheduler, static dispatcher
(b) packet dispatcher, real-time classifier
(c) First-In First-Out (FIFO) queue, packet classifier
(d) packet classifier, actual scheduler
Item-level feedback: See section 2.3.2, subsection "Fair Queuing Packet Scheduling," in the course notes.
51. In Quality of Service (QoS) networks, using a weighted fair queuing (WFQ) scheduler is a typical way to support
(a) network monitoring
(b) packet classification
(c) admission control
(d) bandwidth reservation
Item-level feedback: See section 2.3.2, subsection "Weighted Fair Queuing," in the course notes.
52. Which of the following is (are) true about Quality of Service (QoS) networks?
I. The complexity of routers is less than in other kinds of networks.
II. Routers must maintain more state information than in other kinds of networks.
(a) I and II
(b) I only
(c) None
(d) II only 100%
Item-level feedback: See section 2.3.2, subsection "Discussion," in the course notes.
53. In the IETF Integrated Services (IntServ) model, which of the following is (are) available to an application that uses the guaranteed service class?
I. A packet latency guarantee
II. A bandwidth guarantee
(a) I only
(b) II only
(c) None
(d) I and II
Item-level feedback: See section 2.3.3, subsection "The Integrated Services Model," in the course notes.
54. Compared to the IETF Integrated Services (IntServ) model, which of the following is a unique goal of the Differentiated Services (DiffServ) model?
(a) Maximum application support
(b) Minimum packet delay
(c) Maximum throughput
(d) Maximum scalability
Item-level feedback: See section 2.3.3, subsection "The Differentiated Services Model," in the course notes.
55. Which of the following is (are) used by distributed computer systems to synchronize clocks?
I. Network Time Protocol (NTP)
II. Global Positioning System (GPS)
(a) I only
(b) II only
(c) None
(d) I and II
Item-level feedback: See section 3.1.2, subsection "Logical vs. Physical Clocks," in the course notes.
56. Which of the following approximates a global physical clock that uses the happens-before partial order?
(a) Local clock
(b) Global Positioning System (GPS) clock
(c) Network Time Protocol (NTP) clock
(d) Logical clock
Item-level feedback: See section 3.1.2, subsection "Logical vs. Physical Clocks," in the course notes.
57. Which of the following types of events in a distributed system can typically be ordered arbitrarily?
(a) Logical
(b) Physical
(c) Communication
(d) Disjoint
Item-level feedback: See section 3.1.2, subsection "Logical vs. Physical Clocks," in the course notes.
58. In a distributed system, which of the following would best tolerate a Byzantine failure?
(a) Backups
(b) Checkpoints
(c) Internal state synchronizations
(d) Mirroring with voting
Item-level feedback: See section 3.1.3, subsection "Improving fault tolerance," in the course notes.
59. Which of the following is (are) true about distributed file systems?
I. Files and directories are stored on network servers.
II. Distributed file systems typically support fine-grained sharing.
III. Distributed file systems typically use communicating protocols such as Remote Procedure Call (RPC).
(a) II only
(b) I and II only
(c) I, II, and III
(d) I and III only
Item-level feedback: See section 3.1.4, subsection "Overview," in the course notes.
60. Distributed applications often manage inter-process communication though _____, a method that uses a logically shared address space.
(a) message passing
(b) distributed file systems
(c) databases
(d) distributed shared memory
Item-level feedback: See section 3.1.4, subsection "Overview," in the course notes.
61. Some distributed file systems allow multiple copies of files due to caching. Which of the following types of distributed file servers leave(s) the resolution of file consistency issues up to the users?
I. Stateless
II. Stateful
(a) II only
(b) I and II
(c) None
(d) I only
Item-level feedback: See section 3.1.4, subsection "Consistency," in the course notes.
62. Which of the following security threats is not typically addressed by encryption?
(a) Snooping
(b) Message modification
(c) Impersonation
(d) Denial of Service
Item-level feedback: See section 3.1.5, subsection "Denial of Service Attacks," in the course notes.
63. Which of the following protocols requires the transmission of a user's password or private key across the network?
I. Kerberos
II. Secure Socket Layer (SSL)
(a) I only
(b) I and II
(c) II only
(d) None
Item-level feedback: See section 3.1.6, subsection "Kerberos, 3.1.6#Secure Socket Layer," in the course notes.
64. Which of the following can be used for user authentication?
I. Kerberos
II. Secure Socket Layer (SSL)
(a) I only
(b) II only
(c) None
(d) I and II
Item-level feedback: See section 3.1.6, subsection "Kerberos, 3.1.6#Secure Socket Layer," in the course notes.
65. Consider a client/server setup in which the client must access data that is stored on the server. A Remote Procedure Call (RPC) is typically suitable for accessing data with which of the following characteristics?
I. The data is too large to transfer to the client.
II. The data is real-time streaming audio.
III. The data is sensitive from a security standpoint.
(a) II only
(b) II and III only
(c) I, II, and III
(d) I and III only
Item-level feedback: See section 3.2.1, subsection "Remote Procedure/Method Invocation," in the course notes.
66. In Remote Procedure Call (RPC) or Remote Method Invocation (RMI), a remote call will typically take _____ time and handle _____ exceptions than the equivalent local call.
(a) less, more
(b) greater, fewer
(c) less, fewer
(d) greater, more
Item-level feedback: See section 3.2.1, subsection "Remote Procedure/Method Invocation," in the course notes.
67. In Java Remote Method Invocation (RMI), which of the following is done by the RMI compiler?
(a) Compiling the source files into Java byte code
(b) Linking RMI runtime packages
(c) Marshalling the parameters
(d) Generating stubs and skeletons
Item-level feedback: See section 3.2.1, subsection "Remote Procedure/Method Invocation," in the course notes.
68. In Java Remote Method Invocation (RMI), a remote object registry is a _____ that _____ remote objects.
(a) class factory, generates instances of
(b) client stub, sends requests to
(c) server skeleton, creates runtime environments of
(d) naming service, binds names with
Item-level feedback: See section 3.2.1, subsection "Remote Procedure/Method Invocation," in the course notes.
69. In order to obtain a reference in Java to a remote object in Remote Method Invocation (RMI), the URL passed to the naming service includes the _____ name and the host where the _____ is located.
(a) object, object
(b) class, registry
(c) class, object
(d) object, registry
Item-level feedback: See section 3.2.1, subsection "Remote Procedure/Method Invocation," in the course notes.
70. For Java applets running in a sandbox, all of the following security risks are strongly defended except for
(a) executing invalid instructions
(b) corrupting of files
(c) accessing restricted system memory
(d) overutilization of system resources
Item-level feedback: See section 3.2.2, subsection "Mobile Code," in the course notes.
71. Which of the following is responsible for providing a safe running environment for Java applets?
(a) The Web server
(b) The Java Virtual Machine
(c) The Operating System
(d) The Web browser
Item-level feedback: See section 3.2.2, subsection "Applet Summary," in the course notes.
72. Which of the following statements about Java Database Connectivity (JDBC) is not true?
(a) JDBC provides mappings between Java and SQL data types.
(b) JDBC can establish a connection to a database server.
(c) JDBC has a driver manager to interact with various database drivers.
(d) JDBC is an object-oriented implementation of ODBC.
Item-level feedback: See section 3.2.3, subsection "JDBC," in the course notes.
73. Which of the following does not use a hierarchical naming convention?
(a) Domain Name Service (DNS)
(b) Light-weight Directory Access Protocol (LDAP)
(c) Java RMI Registry
(d) Service Location Protocol (SLP)
Item-level feedback: See section 3.2.4 in the course notes.
74. For CORBA naming services, the result of a lookup is
(a) a registry key
(b) a class name
(c) a server address
(d) an object reference
Item-level feedback: See section 3.2.4, subsection "Naming Services," in the course notes.
75. Which of the following methods can be used to isolate mobile code from the rest of the system?
I. Monitoring system calls
II. Running the code in a shared thread
III. Interpreting the code execution
(a) I and II only
(b) II and III only
(c) I, II, and III
(d) I and III only
Item-level feedback: See section 3.2.2, subsection "Mobile Code," in the course notes.
76. A comprehensive distributed computing environment should support which of the following functionalities?
I. Remote code execution
II. Dynamic instantiation of services
III. Location and naming services
(a) I and II only
(b) I and III only
(c) II and III only
(d) I, II, and III
Item-level feedback: See section 3.3.1 in the course notes.
77. In Common Object Request Broker Architecture (CORBA), the static binding between a client and a remote object happens when the
(a) remote method is invoked
(b) client is first started
(c) remote object is created
(d) source code is compiled
Item-level feedback: See section 3.3.2, subsection "CORBA Architecture," in the course notes.
78. In Common Object Request Broker Architecture (CORBA), which of the following is (are) true about the Interface Description Language (IDL)?
I. It is programming language independent.
II. It supports interface inheritance.
III. The IDL interfaces can be automatically generated from the native code implementation.
(a) I and III only
(b) I only
(c) II only
(d) I, II, and III
Item-level feedback: See section 3.3.2, subsection "CORBA Architecture," in the course notes.
79. Which of the following is true about Object Resource Brokers (ORBs) that are implemented by different vendors?
(a) Object Management Group (OMG) does not define all functions that an ORB must provide.
(b) The Internet Inter-ORB Protocol (IIOP) is designed to connect ORBs implemented by the same vendor.
(c) Vendors typically mix different types of services with a uniform policy.
(d) All vendors are free to choose their own implementation techniques.
Item-level feedback: See section 3.3.2, subsection "CORBA and Interoperability," in the course notes.
80. The Distributed Computing Environment (DCE) supports which, if any, of the following?
I.Inheritance
II.Polymorphism
III.Dynamic invocations
(a) I only
(b) I and III only
(c) II only
(d) None
Item-level feedback: See section 3.3.3, subsection "Overview," in the course notes.
Дата добавления: 2015-10-16; просмотров: 164 | Нарушение авторских прав
<== предыдущая страница | | | следующая страница ==> |
Шаг 4. Создание сводной таблицы | | | При выборе между двумя размерами, выбирайте больший. |