Deck 11: Networked Applications

Full screen (f)
exit full mode
Question
Having all privileges on a computer is known as having ________.

A)access
B)omniscience
C)root privileges
D)mojo
Use Space or
up arrow
down arrow
to flip the card.
Question
A traditional e-mail user sending messages to his or her mail server would most likely use ________.

A)IMAP standard
B)POP standard
C)either IMAP or POP standard
D)SMTP standard
Question
A traditional e-mail user retrieving messages from his or her mail server could use ________.

A)IMAP standard
B)POP standard
C)either IMAP or POP standard
D)SMTP standard
Question
A networked application is an application that requires a network to operate.
Question
The Trojan horse placed on the first compromised GHOSTNET client could ________.

A)conduct audio and video surveillance
B)delete files
C)both A and B
D)neither A nor B
Question
RFC 822 and RFC 2822 standards govern ________.

A)plain text content of e-mail messages
B)HTTP page contents
C)HTML page contents
D)pages written in any language
Question
In XSS,the malicious script that gets placed in a webpage sent to a target is ________.

A)created by a Trojan horse
B)sent by someone who has compromised the webserver
C)embedded in a database the user queries
D)sent by a user
Question
Antivirus software checks e-mail attachments for ________.

A)viruses
B)Trojan horses
C)both A and B
D)neither A nor B
Question
E-mail bodies that have non-English text use ________.

A)RFC 822 and RFC 2822
B)HTTP
C)MIME
D)UNICODE
Question
Which of the following offers more reliable antivirus protection?

A)antivirus software on user PCs
B)antivirus software on the mail server
C)Both A and B are about equally reliable.
Question
Typically,the most common way for an attacker to get extensive privileges on a computer is to ________.

A)take over an application program
B)take over the operating system
C)take over a computer's hardware
D)privilege escalation after an initial takeover
Question
If companies place antivirus software on all of their client PCs,this will stop almost all virus infections.
Question
The advance that made the client/server application architecture possible was ________.

A)the Internet
B)client processing power
C)application sophistication
D)input/output methods
Question
Which of the following allows you to read your e-mail easily on an Internet café's computer?

A)POP
B)Web-enabled e-mail
C)both A and B
D)neither A nor B
Question
The attack on GHOSTNET began with ________.

A)a wireless vulnerability
B)a social engineering attack
C)malicious mobile code
D)an insider attack
Question
Users are primarily concerned with the ________ layer.

A)application
B)transport
C)internet
D)physical
Question
The way in which application layer functions are spread among computers to deliver service to users is called ________.

A)distributed processing
B)peer-to-peer computing
C)client/server computing
D)an application architecture
Question
Mail servers communicate with each other by using ________.

A)POP
B)HTTP
C)RFC 2822
D)SMTP
Question
A lesson of XSS is that programmers should never trust ________.

A)contractors
B)their own staff colleagues
C)databases
D)user input
Question
In SQL injection attacks,the attacker sends ________.

A)a legitimate SQL query
B)a malformed SQL query
C)user input that is used in an SQL query
D)an SQL query in malware that is delivered to the target computer
Question
Which of the following signaling standards is likely to dominate in VoIP?

A)SIP
B)H)323
Question
Speech codecs ________.

A)translate human voice signals into digital signals for transmission
B)translate human voice signals into analog signals for transmission
C)both A and B
D)neither A nor B
Question
Telephones that can plug directly into a VoIP network are called PCs with multimedia hardware and added software.
Question
A media gateway connects a client computer or VoIP phone to the VoIP network.
Question
Which of the following provides end-to-end encryption?

A)SSL/TLS
B)PGP
C)both A and B
D)neither A nor B
Question
VoIP users have ________ in their phones or on their computers.

A)media gateways
B)codecs
C)both A and B
D)neither A nor B
Question
Codec data comes after the ________ header in VoIP transport frames.

A)IP
B)TCP
C)UDP
D)RTP
Question
For the transport layer,VoIP uses ________ for transport transmission.

A)TCP
B)UDP
C)SIP
D)IP
Question
Which header comes SECOND in a VoIP transport packet?

A)RTP
B)UDP
C)TCP
D)Application
Question
SIP is a ________ protocol for VoIP.

A)signaling
B)transport
C)both A and B
D)neither A nor B
Question
When an e-mail user encrypts an outgoing messages with SSL/TLS,how far will this encryption extend?

A)to the sender's e-mail server
B)to the receiver's e-mail server
C)to the receiver's client host
D)to an application program on the receiver's client host
Question
The main promise of VoIP is to ________.

A)add video
B)improve voice quality
C)improve reliability
D)reduce cost
Question
A media gateway translates ________ transmissions.

A)signaling
B)transport
C)both A and B
D)neither A nor B
Question
Which of the following is used to retrieve Web pages?

A)HTTP
B)HTML
C)RTP
D)SQL
Question
Speech codecs vary with respect to ________.

A)compression
B)voice quality
C)both A and B
D)neither A nor B
Question
RTP supports ________.

A)faster transmission speed
B)jitter control
C)both A and B
D)neither A nor B
Question
The SIP invite is transmitted to the ________.

A)called party's SIP proxy server
B)called party's VoIP phone or computer
C)both A and B
D)neither A nor B
Question
What is the almost universal standard for end-to-end encryption?

A)SSL/TLS
B)IPsec
C)PGP
D)There is no almost universal standard for end-to-end encryption.
Question
VoIP ________ uses the Internet Protocol for transmission.

A)always
B)usually
C)seldom
D)never
Question
According to the principle of defense in depth,antivirus filtering should be done in at least ________ location(s).

A)1
B)2
C)3
D)4
Question
How many HTTP request-response cycles are needed to transfer a webpage containing three graphics images?

A)1
B)2
C)3
D)none of the above
Question
Which of the following steps are done in order during a call with Skype?

A)login, signaling, transport
B)signaling, transport, end a call
C)login, signaling, end a call
D)none of the above
Question
Skype offers ________.

A)free calling among Skype customers
B)free calling to and from Public Switched Telephone Network customers
C)both A and B
D)neither A nor B
Question
BitTorrent's .torrent files are stored on the ________.

A)swarm
B)index server
C)tracker
D)individual peers
Question
Which of the following is considered a bigger problem with traditional client/server based architectures than with peer-to-peer architectures?

A)underutilized processing capacity of client PCs
B)potential for essential data/services to become unavailable as a device is turned off
C)both A and B
D)neither A nor B
Question
In ________ file retrieval,your computer downloads a file from a server.

A)P2P
B)client/server
C)BitTorrent
D)none of the above
Question
In BitTorrent,a(n)________ is a server that coordinates the file transfer.

A)swarm
B)index
C)tracker
D)none of the above
Question
Which element of the Skype network is in charge of transport?

A)the login server
B)the calling and called host nodes
C)super nodes
D)media gateways
Question
Which of the following is a security risk associated with BitTorrent?

A)danger caused by opening ports on the firewall
B)danger that an employee may download an infected file that cannot be rejected by filtering
C)both A and B
D)neither A nor B
Question
Tor was created to improve ________.

A)anonymity
B)end-to-end encryption
C)file download speed
D)all of the above
Question
In BitTorrent,the group of all connected computers that have all or part of the file to be downloaded is called the ________.

A)swarm
B)index peers
C)trackers
D)none of the above
Question
Which element of the Skype network is in charge of signaling?

A)the login server
B)host nodes
C)super nodes
D)media gateways
Question
The main advantage of ________ file sharing is that it brings cost savings by using clients rather than server processing power.

A)BitTorrent
B)client/server
C)both A and B
D)neither A nor B
Question
In Skype,________ is the process where a Skype application looks up the username and IP address of the party it wants to contact.

A)login
B)directory search
C)transport
D)signaling
Question
In BitTorrent,a(n)________ website is a site the BitTorrent client program goes to in order to get .torrent files.

A)swarm
B)index
C)tracker
D)none of the above
Question
Which of the following is NOT one of the main elements of the Skype network?

A)login server
B)proxy server
C)host node
D)super node
Question
Which of the following is used to define webpage bodies?

A)HTTP
B)HTML
C)both A and B
D)neither A nor B
Question
Transient client presence tends to be a problem in ________.

A)P2P applications
B)client/server applications
C)both A and B
D)neither A nor B
Question
Which of the following is a processor-sharing application?

A)BitTorrent
B)SETI@home
C)SIP
D)Skype
Question
How many HTTP request-response cycles are needed to transfer a webpage containing 88 lines of text and three different images?

A)3
B)4
C)88
D)91
Question
Tor provides confidentiality ________.

A)all the way to the destination host
B)up to the entry P2P node
C)up to the exit P2P node
D)Tor does not provide confidentiality.
Question
Most P2P applications use servers.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/62
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Networked Applications
1
Having all privileges on a computer is known as having ________.

A)access
B)omniscience
C)root privileges
D)mojo
C
2
A traditional e-mail user sending messages to his or her mail server would most likely use ________.

A)IMAP standard
B)POP standard
C)either IMAP or POP standard
D)SMTP standard
D
3
A traditional e-mail user retrieving messages from his or her mail server could use ________.

A)IMAP standard
B)POP standard
C)either IMAP or POP standard
D)SMTP standard
C
4
A networked application is an application that requires a network to operate.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
5
The Trojan horse placed on the first compromised GHOSTNET client could ________.

A)conduct audio and video surveillance
B)delete files
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
6
RFC 822 and RFC 2822 standards govern ________.

A)plain text content of e-mail messages
B)HTTP page contents
C)HTML page contents
D)pages written in any language
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
7
In XSS,the malicious script that gets placed in a webpage sent to a target is ________.

A)created by a Trojan horse
B)sent by someone who has compromised the webserver
C)embedded in a database the user queries
D)sent by a user
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
8
Antivirus software checks e-mail attachments for ________.

A)viruses
B)Trojan horses
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
9
E-mail bodies that have non-English text use ________.

A)RFC 822 and RFC 2822
B)HTTP
C)MIME
D)UNICODE
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following offers more reliable antivirus protection?

A)antivirus software on user PCs
B)antivirus software on the mail server
C)Both A and B are about equally reliable.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
11
Typically,the most common way for an attacker to get extensive privileges on a computer is to ________.

A)take over an application program
B)take over the operating system
C)take over a computer's hardware
D)privilege escalation after an initial takeover
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
12
If companies place antivirus software on all of their client PCs,this will stop almost all virus infections.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
13
The advance that made the client/server application architecture possible was ________.

A)the Internet
B)client processing power
C)application sophistication
D)input/output methods
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following allows you to read your e-mail easily on an Internet café's computer?

A)POP
B)Web-enabled e-mail
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
15
The attack on GHOSTNET began with ________.

A)a wireless vulnerability
B)a social engineering attack
C)malicious mobile code
D)an insider attack
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
16
Users are primarily concerned with the ________ layer.

A)application
B)transport
C)internet
D)physical
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
17
The way in which application layer functions are spread among computers to deliver service to users is called ________.

A)distributed processing
B)peer-to-peer computing
C)client/server computing
D)an application architecture
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
18
Mail servers communicate with each other by using ________.

A)POP
B)HTTP
C)RFC 2822
D)SMTP
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
19
A lesson of XSS is that programmers should never trust ________.

A)contractors
B)their own staff colleagues
C)databases
D)user input
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
20
In SQL injection attacks,the attacker sends ________.

A)a legitimate SQL query
B)a malformed SQL query
C)user input that is used in an SQL query
D)an SQL query in malware that is delivered to the target computer
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following signaling standards is likely to dominate in VoIP?

A)SIP
B)H)323
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
22
Speech codecs ________.

A)translate human voice signals into digital signals for transmission
B)translate human voice signals into analog signals for transmission
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
23
Telephones that can plug directly into a VoIP network are called PCs with multimedia hardware and added software.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
24
A media gateway connects a client computer or VoIP phone to the VoIP network.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following provides end-to-end encryption?

A)SSL/TLS
B)PGP
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
26
VoIP users have ________ in their phones or on their computers.

A)media gateways
B)codecs
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
27
Codec data comes after the ________ header in VoIP transport frames.

A)IP
B)TCP
C)UDP
D)RTP
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
28
For the transport layer,VoIP uses ________ for transport transmission.

A)TCP
B)UDP
C)SIP
D)IP
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
29
Which header comes SECOND in a VoIP transport packet?

A)RTP
B)UDP
C)TCP
D)Application
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
30
SIP is a ________ protocol for VoIP.

A)signaling
B)transport
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
31
When an e-mail user encrypts an outgoing messages with SSL/TLS,how far will this encryption extend?

A)to the sender's e-mail server
B)to the receiver's e-mail server
C)to the receiver's client host
D)to an application program on the receiver's client host
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
32
The main promise of VoIP is to ________.

A)add video
B)improve voice quality
C)improve reliability
D)reduce cost
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
33
A media gateway translates ________ transmissions.

A)signaling
B)transport
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following is used to retrieve Web pages?

A)HTTP
B)HTML
C)RTP
D)SQL
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
35
Speech codecs vary with respect to ________.

A)compression
B)voice quality
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
36
RTP supports ________.

A)faster transmission speed
B)jitter control
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
37
The SIP invite is transmitted to the ________.

A)called party's SIP proxy server
B)called party's VoIP phone or computer
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
38
What is the almost universal standard for end-to-end encryption?

A)SSL/TLS
B)IPsec
C)PGP
D)There is no almost universal standard for end-to-end encryption.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
39
VoIP ________ uses the Internet Protocol for transmission.

A)always
B)usually
C)seldom
D)never
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
40
According to the principle of defense in depth,antivirus filtering should be done in at least ________ location(s).

A)1
B)2
C)3
D)4
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
41
How many HTTP request-response cycles are needed to transfer a webpage containing three graphics images?

A)1
B)2
C)3
D)none of the above
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following steps are done in order during a call with Skype?

A)login, signaling, transport
B)signaling, transport, end a call
C)login, signaling, end a call
D)none of the above
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
43
Skype offers ________.

A)free calling among Skype customers
B)free calling to and from Public Switched Telephone Network customers
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
44
BitTorrent's .torrent files are stored on the ________.

A)swarm
B)index server
C)tracker
D)individual peers
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following is considered a bigger problem with traditional client/server based architectures than with peer-to-peer architectures?

A)underutilized processing capacity of client PCs
B)potential for essential data/services to become unavailable as a device is turned off
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
46
In ________ file retrieval,your computer downloads a file from a server.

A)P2P
B)client/server
C)BitTorrent
D)none of the above
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
47
In BitTorrent,a(n)________ is a server that coordinates the file transfer.

A)swarm
B)index
C)tracker
D)none of the above
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
48
Which element of the Skype network is in charge of transport?

A)the login server
B)the calling and called host nodes
C)super nodes
D)media gateways
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following is a security risk associated with BitTorrent?

A)danger caused by opening ports on the firewall
B)danger that an employee may download an infected file that cannot be rejected by filtering
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
50
Tor was created to improve ________.

A)anonymity
B)end-to-end encryption
C)file download speed
D)all of the above
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
51
In BitTorrent,the group of all connected computers that have all or part of the file to be downloaded is called the ________.

A)swarm
B)index peers
C)trackers
D)none of the above
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
52
Which element of the Skype network is in charge of signaling?

A)the login server
B)host nodes
C)super nodes
D)media gateways
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
53
The main advantage of ________ file sharing is that it brings cost savings by using clients rather than server processing power.

A)BitTorrent
B)client/server
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
54
In Skype,________ is the process where a Skype application looks up the username and IP address of the party it wants to contact.

A)login
B)directory search
C)transport
D)signaling
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
55
In BitTorrent,a(n)________ website is a site the BitTorrent client program goes to in order to get .torrent files.

A)swarm
B)index
C)tracker
D)none of the above
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following is NOT one of the main elements of the Skype network?

A)login server
B)proxy server
C)host node
D)super node
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following is used to define webpage bodies?

A)HTTP
B)HTML
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
58
Transient client presence tends to be a problem in ________.

A)P2P applications
B)client/server applications
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is a processor-sharing application?

A)BitTorrent
B)SETI@home
C)SIP
D)Skype
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
60
How many HTTP request-response cycles are needed to transfer a webpage containing 88 lines of text and three different images?

A)3
B)4
C)88
D)91
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
61
Tor provides confidentiality ________.

A)all the way to the destination host
B)up to the entry P2P node
C)up to the exit P2P node
D)Tor does not provide confidentiality.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
62
Most P2P applications use servers.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 62 flashcards in this deck.