Deck 11: Networked Applications

Full screen (f)
exit full mode
Question
Content delivery networks mainly ________.

A) increase transmission speed
B) increase program selection
C) decrease program selection
D) reduce latency
Use Space or
up arrow
down arrow
to flip the card.
Question
A ________ may have multiple ________.

A) physical server; virtual machines
B) virtual machine; physical servers
C) both A and B
D) neither A nor B
Question
A lesson of XSS is that programmers should never trust ________.

A) contractors
B) their own staff colleagues
C) databases
D) user input
Question
Netflix uses AWS for its ________.

A) recommendation system
B) content delivery appliances
C) both A and B
D) neither A nor B
Question
Falling network costs are resulting in ________.

A) the consolidation of servers
B) server farms for cloud computing
C) both A and B
D) neither A nor B
Question
Having all privileges on a computer is known as having ________.

A) access
B) totality
C) root privileges
D) mojo
Question
The primary applications architecture is ________.

A) TCP/IP
B) OSI
C) client/server
D) HTTP
Question
The main advance that made the client/server application architecture possible was ________.

A) the Internet
B) growing client processing power
C) growing application sophistication
D) new input/output methods
Question
Creating a new VM is ________.

A) booting
B) startup
C) birthing
D) instantiation
Question
The primary applications architecture is ________.

A) TCP/IP
B) OSI
C) both A and B
D) neither A nor B
Question
The way in which application layer functions are spread among computers to deliver service to users is called ________.

A) distributed processing
B) peer-to-peer computing
C) client/server computing
D) an application architecture
Question
A networked application requires a network to operate.
Question
Typically,the most common way for an attacker to get extensive privileges on a computer is ________.

A) to take over an application program
B) to take over the operating system
C) to take over a computer's hardware
D) privilege escalation after a hack
Question
The main advance that made the client/server application architecture possible was ________.

A) the Internet
B) growing client processing power
C) growing application sophistication
D) new input/output methods
Question
Compared to physical servers,virtual machines ________.

A) can be moved more easily
B) potentially have infinite capacity
C) both A and B
D) neither A nor B
Question
For ________,Netflix owns and operates the servers.

A) its recommendation system
B) e-mail
C) both A and B
D) neither A nor B
Question
When you login to a website and it responds by saying,"Hello yourname," this is primarily creates a ________ problem.

A) security
B) privacy
C) user interface
D) network
Question
The explosion of apps on small mobile devices raises ________ issues.

A) cumulative cost
B) inventory control
C) security
D) network load
Question
Netflix transcoding is based on ________.

A) network speed
B) the user's display device characteristics
C) both A and B
D) neither A nor B
Question
Growing client processing power was a major driving force behind the ________ application architecture.

A) client/server
B) P2P
C) both A and B
D) neither A nor B
Question
Netflix has the most VMs ________.

A) on weekends
B) on weekdays
C) in the evenings
D) The number of VMs is fixed over periods of a month or longer.
Question
Which type of service manages application software for users?

A) IaaS
B) SaaS
C) both A and B
D) neither A nor B
Question
If you are downloading a webpage containing three graphics images,which file will you download first?

A) The first image.
B) The second image.
C) The third image.
D) none of the above
Question
For Netflix,Google is a(n)________.

A) IaaS
B) SaaS
C) both A and B
D) neither A nor B
Question
Which tends to have a data field?

A) an HTTP request message
B) an HTTP response message
C) both A and B
D) neither A nor B
Question
Which of the following is a file transfer standard?

A) HTML
B) HTTP
C) both A and B
D) neither A nor B
Question
An IaaS owns and operates ________.

A) servers
B) application programs
C) both A and B
D) neither A nor B
Question
IaaSs own ________.

A) application software
B) servers
C) both A and B
D) neither A nor B
Question
An IaaS owns ________.

A) servers
B) application programs
C) both A and B
D) neither A nor B
Question
When a cloud client customer moves from one client machine to another,________.

A) the same data files are available
B) the same application software personalization is in effect
C) both A and B
D) neither A nor B
Question
The first line in an HTTP request message is called the ________.

A) request line
B) status line
C) both A and B
D) neither A nor B
Question
CSPs often offer ________.

A) ISP services
B) IaaS services
C) both A and B
D) neither A nor B
Question
In cloud computing,latency is important for ________.

A) AI-based cloud applications
B) e-mail
C) both A and B
D) neither A nor B
Question
Which of the following is a file format standard?

A) HTML
B) HTTP
C) both A and B
D) neither A nor B
Question
For Netflix,________ is a(n)________,and ________ is a(n)________.

A) Google; IaaS; AWS; IaaS
B) Google; SaaS; AWS; SaaS
C) Google; IaaS; AWS; SaaS
D) Google; SaaS; AWS; IaaS
Question
On networks,cloud computing is increasing the need for ________.

A) sudden changes in traffic
B) reliability
C) controlled latency
D) all of the above
Question
Cloud customers are concerned that ________.

A) their data might be hacked
B) the government may access their data secretly
C) both A and B
D) neither A nor B
Question
How many HTTP request-response cycles are needed to transfer a webpage containing 88 lines of text and three different images?

A) 3
B) 4
C) 88
D) 91
Question
For Netflix,AWS is a(n)________.

A) ISP
B) IaaS
C) SaaS
D) all of the above
Question
How many HTTP request-response cycles are needed to transfer a webpage containing three graphics images?

A) 1
B) 2
C) 3
D) none of the above
Question
Speech codecs ________.

A) translate human voice signals into digital signals for transmission
B) translate human voice signals into analog signals for transmission
C) both A and B
D) neither A nor B
Question
VoIP ________ uses the Internet Protocol for transmission.

A) always
B) usually
C) seldom
D) never
Question
In e-mail,SSL/TLS provides ________.

A) link encryption
B) end-to-end encryption
C) both A and B
D) neither A nor B
Question
Why is link-by-link encryption for confidentiality not fully secure even if there is encryption for confidentiality in all links along the way?

A) There cannot be confidentiality on each link.
B) Devices along the way may not be secure.
C) both A and B
D) neither A nor B
Question
Which of the following allows you to read your e-mail easily on an Internet café's computer?

A) IMAP
B) HTTP
C) HTML
D) SMTP
Question
When an e-mail user encrypts an outgoing message with SSL/TLS,how far will this encryption extend?

A) to the sender's e-mail server
B) to the receiver's e-mail server
C) to the receiver's client host
D) to an application program on the receiver's client host
Question
E-mail bodies that have non-English text use ________.

A) RFC 822 and RFC 2822
B) HTTP
C) MIME
D) UNICODE
Question
There is usually a time difference ________.

A) between transmission from the sender to his or her mail server and the transmission to the receiver's mail server
B) between transmission to the receiver's mail server and the reading of the message by the receiver.
C) both A and B
D) neither A nor B
Question
When the sender's mail host sends the message to the receiver's mail host,what standard does it use?

A) HTTP
B) HTML
C) SMTP
D) FTP
Question
In traditional e-mail,when a client sends a message to its mail host,what standard does it use?

A) HTTP
B) HTML
C) SMTP
D) FTP
Question
A traditional e-mail user retrieving messages from her mail server could use ________.

A) IMAP
B) HTTP
C) HTML
D) SMTP
Question
VoIP is an acronym for ________.

A) Voice over IP
B) Video over IP
C) both A and B
D) neither A nor B
Question
The first line in an HTTP response message is called the ________.

A) status line
B) command line
C) reply line
D) response line
Question
VoIP users have ________ in their phones or on their computers.

A) media gateways
B) codecs
C) both A and B
D) neither A nor B
Question
What is the universal standard for end-to-end encryption?

A) SSL/TLS
B) IPsec
C) S/MIME
D) There is no universal standard for end-to-end encryption.
Question
In e-mail,UNICODE enhances security.
Question
In Web-based e-mail,when a client sends a message to its mail host,what standard does it use?

A) HTTP
B) HTML
C) SMTP
D) FTP
Question
Which of the following provides end-to-end encryption?

A) SSL/TLS
B) S/MIME
C) both A and B
D) neither A nor B
Question
Which of the following forms of e-mail is usually easier to use if you are using someone else's computer?

A) Webmail
B) Mail programs using SMTP and POP
C) Mail programs using SMTP and IMAP
D) none of the above
Question
In HTTP,each line after the first begins with a ________.

A) keyword
B) command
C) CRLF
D) value
Question
A media gateway connects a client computer,or VoIP phone,to the VoIP network.
Question
Speech codecs vary with respect to ________.

A) compression
B) voice quality
C) both A and B
D) neither A nor B
Question
RTP supports ________.

A) faster transmission speed
B) jitter control
C) both A and B
D) neither A nor B
Question
In which VoIP phase does Skype use a server instead of service directly between peers?

A) signaling
B) transport
C) login
D) none of the above
Question
Which phase of VoIP is different in traditional VoIP and Skype?

A) signaling
B) transport
C) login
D) none of the above
Question
Skype login is necessary so that the user ________.

A) can find the IP address of a Skype proxy server
B) can find the IP address of a client it wishes to communicate with
C) can find her own Skype address
D) none of the above
Question
Which of the following is considered a bigger problem with client/server architecture than peer-to-peer architecture?

A) underutilized processing capacity of client PCs
B) potential for essential data/services to become unavailable because devices providing services are often turned off
C) lack of corporate control
D) none of the above
Question
A media gateway translates ________ methods.

A) signaling
B) transport
C) both A and B
D) neither A nor B
Question
SIP is a ________ protocol for VoIP.

A) signaling
B) transport
C) both A and B
D) neither A nor B
Question
For the transport layer,VoIP uses ________ for transport transmission.

A) TCP
B) UDP
C) SIP
D) IP
Question
In which VoIP phase does Skype implement with peer-to-peer service?

A) signaling
B) login
C) both A and B
D) neither A nor B
Question
P2P applications ________.

A) increase IT control
B) increase user control
C) both A and B
D) neither A nor B
Question
Telephones that can plug directly into a VoIP network are called PCs with multimedia hardware and added software.
Question
In Skype,a directory search to find the IP address of a client to be called,is done by ________.

A) peers
B) super nodes
C) Skype servers
D) direct communication between the calling and receiving clients
Question
The SIP invite is transmitted to the ________.

A) called party's SIP proxy server
B) called party's VoIP phone or computer
C) both A and B
D) neither A nor B
Question
In Skype,signaling is done by ________.

A) peers
B) super nodes
C) direct communication between the calling and receiving clients
D) none of the above
Question
In Skype,transport is governed by ________.

A) peers providing signaling
B) super nodes
C) Skype servers
D) direct communication between the calling and receiving peers
Question
In VoIP traffic,the data field in a signaling packet usually carries codec data.
Question
Codec data comes after the ________ header in VoIP transport frames.

A) IP
B) TCP
C) UDP
D) RTP
Question
Skype provides ________.

A) Voice over IP
B) Video over IP
C) both A and B
D) neither A nor B
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/84
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Networked Applications
1
Content delivery networks mainly ________.

A) increase transmission speed
B) increase program selection
C) decrease program selection
D) reduce latency
D
2
A ________ may have multiple ________.

A) physical server; virtual machines
B) virtual machine; physical servers
C) both A and B
D) neither A nor B
A
3
A lesson of XSS is that programmers should never trust ________.

A) contractors
B) their own staff colleagues
C) databases
D) user input
D
4
Netflix uses AWS for its ________.

A) recommendation system
B) content delivery appliances
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
5
Falling network costs are resulting in ________.

A) the consolidation of servers
B) server farms for cloud computing
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
6
Having all privileges on a computer is known as having ________.

A) access
B) totality
C) root privileges
D) mojo
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
7
The primary applications architecture is ________.

A) TCP/IP
B) OSI
C) client/server
D) HTTP
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
8
The main advance that made the client/server application architecture possible was ________.

A) the Internet
B) growing client processing power
C) growing application sophistication
D) new input/output methods
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
9
Creating a new VM is ________.

A) booting
B) startup
C) birthing
D) instantiation
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
10
The primary applications architecture is ________.

A) TCP/IP
B) OSI
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
11
The way in which application layer functions are spread among computers to deliver service to users is called ________.

A) distributed processing
B) peer-to-peer computing
C) client/server computing
D) an application architecture
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
12
A networked application requires a network to operate.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
13
Typically,the most common way for an attacker to get extensive privileges on a computer is ________.

A) to take over an application program
B) to take over the operating system
C) to take over a computer's hardware
D) privilege escalation after a hack
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
14
The main advance that made the client/server application architecture possible was ________.

A) the Internet
B) growing client processing power
C) growing application sophistication
D) new input/output methods
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
15
Compared to physical servers,virtual machines ________.

A) can be moved more easily
B) potentially have infinite capacity
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
16
For ________,Netflix owns and operates the servers.

A) its recommendation system
B) e-mail
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
17
When you login to a website and it responds by saying,"Hello yourname," this is primarily creates a ________ problem.

A) security
B) privacy
C) user interface
D) network
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
18
The explosion of apps on small mobile devices raises ________ issues.

A) cumulative cost
B) inventory control
C) security
D) network load
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
19
Netflix transcoding is based on ________.

A) network speed
B) the user's display device characteristics
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
20
Growing client processing power was a major driving force behind the ________ application architecture.

A) client/server
B) P2P
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
21
Netflix has the most VMs ________.

A) on weekends
B) on weekdays
C) in the evenings
D) The number of VMs is fixed over periods of a month or longer.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
22
Which type of service manages application software for users?

A) IaaS
B) SaaS
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
23
If you are downloading a webpage containing three graphics images,which file will you download first?

A) The first image.
B) The second image.
C) The third image.
D) none of the above
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
24
For Netflix,Google is a(n)________.

A) IaaS
B) SaaS
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
25
Which tends to have a data field?

A) an HTTP request message
B) an HTTP response message
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following is a file transfer standard?

A) HTML
B) HTTP
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
27
An IaaS owns and operates ________.

A) servers
B) application programs
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
28
IaaSs own ________.

A) application software
B) servers
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
29
An IaaS owns ________.

A) servers
B) application programs
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
30
When a cloud client customer moves from one client machine to another,________.

A) the same data files are available
B) the same application software personalization is in effect
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
31
The first line in an HTTP request message is called the ________.

A) request line
B) status line
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
32
CSPs often offer ________.

A) ISP services
B) IaaS services
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
33
In cloud computing,latency is important for ________.

A) AI-based cloud applications
B) e-mail
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following is a file format standard?

A) HTML
B) HTTP
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
35
For Netflix,________ is a(n)________,and ________ is a(n)________.

A) Google; IaaS; AWS; IaaS
B) Google; SaaS; AWS; SaaS
C) Google; IaaS; AWS; SaaS
D) Google; SaaS; AWS; IaaS
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
36
On networks,cloud computing is increasing the need for ________.

A) sudden changes in traffic
B) reliability
C) controlled latency
D) all of the above
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
37
Cloud customers are concerned that ________.

A) their data might be hacked
B) the government may access their data secretly
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
38
How many HTTP request-response cycles are needed to transfer a webpage containing 88 lines of text and three different images?

A) 3
B) 4
C) 88
D) 91
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
39
For Netflix,AWS is a(n)________.

A) ISP
B) IaaS
C) SaaS
D) all of the above
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
40
How many HTTP request-response cycles are needed to transfer a webpage containing three graphics images?

A) 1
B) 2
C) 3
D) none of the above
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
41
Speech codecs ________.

A) translate human voice signals into digital signals for transmission
B) translate human voice signals into analog signals for transmission
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
42
VoIP ________ uses the Internet Protocol for transmission.

A) always
B) usually
C) seldom
D) never
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
43
In e-mail,SSL/TLS provides ________.

A) link encryption
B) end-to-end encryption
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
44
Why is link-by-link encryption for confidentiality not fully secure even if there is encryption for confidentiality in all links along the way?

A) There cannot be confidentiality on each link.
B) Devices along the way may not be secure.
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following allows you to read your e-mail easily on an Internet café's computer?

A) IMAP
B) HTTP
C) HTML
D) SMTP
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
46
When an e-mail user encrypts an outgoing message with SSL/TLS,how far will this encryption extend?

A) to the sender's e-mail server
B) to the receiver's e-mail server
C) to the receiver's client host
D) to an application program on the receiver's client host
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
47
E-mail bodies that have non-English text use ________.

A) RFC 822 and RFC 2822
B) HTTP
C) MIME
D) UNICODE
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
48
There is usually a time difference ________.

A) between transmission from the sender to his or her mail server and the transmission to the receiver's mail server
B) between transmission to the receiver's mail server and the reading of the message by the receiver.
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
49
When the sender's mail host sends the message to the receiver's mail host,what standard does it use?

A) HTTP
B) HTML
C) SMTP
D) FTP
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
50
In traditional e-mail,when a client sends a message to its mail host,what standard does it use?

A) HTTP
B) HTML
C) SMTP
D) FTP
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
51
A traditional e-mail user retrieving messages from her mail server could use ________.

A) IMAP
B) HTTP
C) HTML
D) SMTP
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
52
VoIP is an acronym for ________.

A) Voice over IP
B) Video over IP
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
53
The first line in an HTTP response message is called the ________.

A) status line
B) command line
C) reply line
D) response line
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
54
VoIP users have ________ in their phones or on their computers.

A) media gateways
B) codecs
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
55
What is the universal standard for end-to-end encryption?

A) SSL/TLS
B) IPsec
C) S/MIME
D) There is no universal standard for end-to-end encryption.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
56
In e-mail,UNICODE enhances security.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
57
In Web-based e-mail,when a client sends a message to its mail host,what standard does it use?

A) HTTP
B) HTML
C) SMTP
D) FTP
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following provides end-to-end encryption?

A) SSL/TLS
B) S/MIME
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following forms of e-mail is usually easier to use if you are using someone else's computer?

A) Webmail
B) Mail programs using SMTP and POP
C) Mail programs using SMTP and IMAP
D) none of the above
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
60
In HTTP,each line after the first begins with a ________.

A) keyword
B) command
C) CRLF
D) value
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
61
A media gateway connects a client computer,or VoIP phone,to the VoIP network.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
62
Speech codecs vary with respect to ________.

A) compression
B) voice quality
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
63
RTP supports ________.

A) faster transmission speed
B) jitter control
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
64
In which VoIP phase does Skype use a server instead of service directly between peers?

A) signaling
B) transport
C) login
D) none of the above
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
65
Which phase of VoIP is different in traditional VoIP and Skype?

A) signaling
B) transport
C) login
D) none of the above
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
66
Skype login is necessary so that the user ________.

A) can find the IP address of a Skype proxy server
B) can find the IP address of a client it wishes to communicate with
C) can find her own Skype address
D) none of the above
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
67
Which of the following is considered a bigger problem with client/server architecture than peer-to-peer architecture?

A) underutilized processing capacity of client PCs
B) potential for essential data/services to become unavailable because devices providing services are often turned off
C) lack of corporate control
D) none of the above
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
68
A media gateway translates ________ methods.

A) signaling
B) transport
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
69
SIP is a ________ protocol for VoIP.

A) signaling
B) transport
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
70
For the transport layer,VoIP uses ________ for transport transmission.

A) TCP
B) UDP
C) SIP
D) IP
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
71
In which VoIP phase does Skype implement with peer-to-peer service?

A) signaling
B) login
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
72
P2P applications ________.

A) increase IT control
B) increase user control
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
73
Telephones that can plug directly into a VoIP network are called PCs with multimedia hardware and added software.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
74
In Skype,a directory search to find the IP address of a client to be called,is done by ________.

A) peers
B) super nodes
C) Skype servers
D) direct communication between the calling and receiving clients
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
75
The SIP invite is transmitted to the ________.

A) called party's SIP proxy server
B) called party's VoIP phone or computer
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
76
In Skype,signaling is done by ________.

A) peers
B) super nodes
C) direct communication between the calling and receiving clients
D) none of the above
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
77
In Skype,transport is governed by ________.

A) peers providing signaling
B) super nodes
C) Skype servers
D) direct communication between the calling and receiving peers
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
78
In VoIP traffic,the data field in a signaling packet usually carries codec data.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
79
Codec data comes after the ________ header in VoIP transport frames.

A) IP
B) TCP
C) UDP
D) RTP
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
80
Skype provides ________.

A) Voice over IP
B) Video over IP
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 84 flashcards in this deck.