Business Data Networks and Security, 11e (Panko)
Chapter 11 Networked Applications
1) A networked application requires a network to operate.
Answer: TRUE
Difficulty: Basic
Question: 1a
Objective: Explain core concepts in network applications and architectures.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
2) The way in which application layer functions are spread among computers to deliver service to users is called ________.
A) distributed processing
B) peer-to-peer computing
C) client/server computing
D) an application architecture
Answer: D
Difficulty: Basic
Question: 1b
Objective: Explain core concepts in network applications and architectures.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
3) The primary applications architecture is ________.
A) TCP/IP
B) OSI
C) both A and B
D) neither A nor B
Answer: D
Difficulty: Basic
Question: 1c
Objective: Explain core concepts in network applications and architectures.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
4) The primary applications architecture is ________.
A) TCP/IP
B) OSI
C) client/server
D) HTTP
Answer: C
Difficulty: Basic
Question: 1c
Objective: Explain core concepts in network applications and architectures.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
5) The main advance that made the client/server application architecture possible was ________.
A) the Internet
B) growing client processing power
C) growing application sophistication
D) new input/output methods
Answer: B
Difficulty: Basic
Question: 1d
Objective: Explain core concepts in network applications and architectures.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
6) The main advance that made the client/server application architecture possible was ________.
A) the Internet
B) growing client processing power
C) growing application sophistication
D) new input/output methods
Answer: B
Difficulty: Basic
Question: 1e
Objective: Explain core concepts in network applications and architectures.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
7) Growing client processing power was a major driving force behind the ________ application architecture.
A) client/server
B) P2P
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Basic
Question: 1e
Objective: Explain core concepts in network applications and architectures.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
8) Falling network costs are resulting in ________.
A) the consolidation of servers
B) server farms for cloud computing
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Basic
Question: 1g
Objective: Explain core concepts in network applications and architectures.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
9) Typically, the most common way for an attacker to get extensive privileges on a computer is ________.
A) to take over an application program
B) to take over the operating system
C) to take over a computer’s hardware
D) privilege escalation after a hack
Answer: A
Difficulty: Basic
Question: 2a
Objective: Explain how taking over an application can give a hacker control of a computer.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
10) Having all privileges on a computer is known as having ________.
A) access
B) totality
C) root privileges
D) mojo
Answer: C
Difficulty: Basic
Question: 2b
Objective: Explain how taking over an application can give a hacker control of a computer.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
11) The explosion of apps on small mobile devices raises ________ issues.
A) cumulative cost
B) inventory control
C) security
D) network load
Answer: C
Difficulty: Basic
Question: 2c
Objective: Explain how taking over an application can give a hacker control of a computer.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
12) When you login to a website and it responds by saying, “Hello yourname,” this is primarily creates a ________ problem.
A) security
B) privacy
C) user interface
D) network
Answer: A
Difficulty: Basic
Question: 3a
Objective: Explain how taking over an application can give a hacker control of a computer.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
13) A lesson of XSS is that programmers should never trust ________.
A) contractors
B) their own staff colleagues
C) databases
D) user input
Answer: D
Difficulty: Basic
Question: 3b
Objective: Explain how taking over an application can give a hacker control of a computer.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
14) Netflix transcoding is based on ________.
A) network speed
B) the user’s display device characteristics
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Basic
Question: 4a
Objective: Describe how Netflix uses cloud computing.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
15) Netflix uses AWS for its ________.
A) recommendation system
B) content delivery appliances
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Deeper
Question: 4c
Objective: Describe how Netflix uses cloud computing.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
16) For ________, Netflix owns and operates the servers.
A) its recommendation system
B) e-mail
C) both A and B
D) neither A nor B
Answer: D
Difficulty: Deeper
Question: 4d
Objective: Describe how Netflix uses cloud computing.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
17) Content delivery networks mainly ________.
A) increase transmission speed
B) increase program selection
C) decrease program selection
D) reduce latency
Answer: D
Difficulty: Basic
Question: 4e
Objective: Describe how Netflix uses cloud computing.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
18) A ________ may have multiple ________.
A) physical server; virtual machines
B) virtual machine; physical servers
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Basic
Question: 5a
Objective: Describe how Netflix uses cloud computing.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
19) Compared to physical servers, virtual machines ________.
A) can be moved more easily
B) potentially have infinite capacity
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Basic
Question: 5b
Objective: Describe how Netflix uses cloud computing.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
20) Creating a new VM is ________.
A) booting
B) startup
C) birthing
D) instantiation
Answer: D
Difficulty: Basic
Question: 5c
Objective: Describe how Netflix uses cloud computing.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
21) Netflix has the most VMs ________.
A) on weekends
B) on weekdays
C) in the evenings
D) The number of VMs is fixed over periods of a month or longer.
Answer: C
Difficulty: Deeper
Question: 5d
Objective: Describe how Netflix uses cloud computing.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
22) CSPs often offer ________.
A) ISP services
B) IaaS services
C) both A and B
D) neither A nor B
Answer: B
Difficulty: Basic
Question: 6a
Objective: Describe how Netflix uses cloud computing.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
23) Which type of service manages application software for users?
A) IaaS
B) SaaS
C) both A and B
D) neither A nor B
Answer: B
Difficulty: Basic
Question: 6b
Objective: Describe how Netflix uses cloud computing.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
24) IaaSs own ________.
A) application software
B) servers
C) both A and B
D) neither A nor B
Answer: B
Difficulty: Deeper
Question: 6c
Objective: Describe how Netflix uses cloud computing.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
25) For Netflix, AWS is a(n) ________.
A) ISP
B) IaaS
C) SaaS
D) all of the above
Answer: B
Difficulty: Basic
Question: 6c
Objective: Describe how Netflix uses cloud computing.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
26) For Netflix, Google is a(n) ________.
A) IaaS
B) SaaS
C) both A and B
D) neither A nor B
Answer: B
Difficulty: Basic
Question: 6d
Objective: Describe how Netflix uses cloud computing.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
27) For Netflix, ________ is a(n) ________, and ________ is a(n) ________.
A) Google; IaaS; AWS; IaaS
B) Google; SaaS; AWS; SaaS
C) Google; IaaS; AWS; SaaS
D) Google; SaaS; AWS; IaaS
Answer: D
Difficulty: Deeper
Question: 6d
Objective: Describe how Netflix uses cloud computing.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
28) An IaaS owns and operates ________.
A) servers
B) application programs
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Deeper
Question: 6e
Objective: Describe how Netflix uses cloud computing.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
29) An IaaS owns ________.
A) servers
B) application programs
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Basic
Question: 6f
Objective: Describe how Netflix uses cloud computing.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
30) When a cloud client customer moves from one client machine to another, ________.
A) the same data files are available
B) the same application software personalization is in effect
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Basic
Question: 7a
Objective: Describe how Netflix uses cloud computing.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
31) Cloud customers are concerned that ________.
A) their data might be hacked
B) the government may access their data secretly
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Basic
Question: 8
Objective: Describe how Netflix uses cloud computing.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
32) On networks, cloud computing is increasing the need for ________.
A) sudden changes in traffic
B) reliability
C) controlled latency
D) all of the above
Answer: D
Difficulty: Basic
Question: 9a
Objective: Describe how Netflix uses cloud computing.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
33) In cloud computing, latency is important for ________.
A) AI-based cloud applications
B) e-mail
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Basic
Question: 9b
Objective: Describe how Netflix uses cloud computing.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
34) Which of the following is a file format standard?
A) HTML
B) HTTP
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Deeper
Question: 10a
Objective: Describe how the World Wide Web works.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
35) Which of the following is a file transfer standard?
A) HTML
B) HTTP
C) both A and B
D) neither A nor B
Answer: B
Difficulty: Deeper
Question: 10a
Objective: Describe how the World Wide Web works.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
36) How many HTTP request-response cycles are needed to transfer a webpage containing three graphics images?
A) 1
B) 2
C) 3
D) none of the above
Answer: D
Difficulty: Deeper
Question: 11a
Objective: Describe how the World Wide Web works.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
37) If you are downloading a webpage containing three graphics images, which file will you download first?
A) The first image.
B) The second image.
C) The third image.
D) none of the above
Answer: D
Difficulty: Deeper
Question: 11b
Objective: Describe how the World Wide Web works.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
38) How many HTTP request-response cycles are needed to transfer a webpage containing 88 lines of text and three different images?
A) 3
B) 4
C) 88
D) 91
Answer: B
Difficulty: Deeper
Question: 11b
Objective: Describe how the World Wide Web works.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
39) Which tends to have a data field?
A) an HTTP request message
B) an HTTP response message
C) both A and B
D) neither A nor B
Answer: B
Difficulty: Basic
Question: 12a
Objective: Describe how the World Wide Web works.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
40) The first line in an HTTP request message is called the ________.
A) request line
B) status line
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Deeper
Question: 12b
Objective: Describe how the World Wide Web works.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
41) The first line in an HTTP response message is called the ________.
A) status line
B) command line
C) reply line
D) response line
Answer: A
Difficulty: Deeper
Question: 12c
Objective: Describe how the World Wide Web works.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
42) In HTTP, each line after the first begins with a ________.
A) keyword
B) command
C) CRLF
D) value
Answer: A
Difficulty: Basic
Question: 12d
Objective: Describe how the World Wide Web works.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
43) In traditional e-mail, when a client sends a message to its mail host, what standard does it use?
A) HTTP
B) HTML
C) SMTP
D) FTP
Answer: C
Difficulty: Basic
Question: 13a
Objective: Describe e-mail standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
44) In Web-based e-mail, when a client sends a message to its mail host, what standard does it use?
A) HTTP
B) HTML
C) SMTP
D) FTP
Answer: A
Difficulty: Basic
Question: 13b
Objective: Describe e-mail standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
45) When the sender’s mail host sends the message to the receiver’s mail host, what standard does it use?
A) HTTP
B) HTML
C) SMTP
D) FTP
Answer: C
Difficulty: Basic
Question: 13c
Objective: Describe e-mail standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
46) Which of the following forms of e-mail is usually easier to use if you are using someone else’s computer?
A) Webmail
B) Mail programs using SMTP and POP
C) Mail programs using SMTP and IMAP
D) none of the above
Answer: A
Difficulty: Deeper
Question: 13d
Objective: Describe e-mail standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
47) A traditional e-mail user retrieving messages from her mail server could use ________.
A) IMAP
B) HTTP
C) HTML
D) SMTP
Answer: A
Difficulty: Basic
Question: 14a
Objective: Describe e-mail standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
48) Which of the following allows you to read your e-mail easily on an Internet café’s computer?
A) IMAP
B) HTTP
C) HTML
D) SMTP
Answer: B
Difficulty: Deeper
Question: 14b
Objective: Describe e-mail standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
49) There is usually a time difference ________.
A) between transmission from the sender to his or her mail server and the transmission to the receiver’s mail server
B) between transmission to the receiver’s mail server and the reading of the message by the receiver.
C) both A and B
D) neither A nor B
Answer: B
Difficulty: Deeper
Question: 14c
Objective: Describe e-mail standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
50) E-mail bodies that have non-English text use ________.
A) RFC 822 and RFC 2822
B) HTTP
C) MIME
D) UNICODE
Answer: D
Difficulty: Basic
Question: 15d
Objective: Describe e-mail standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
51) In e-mail, UNICODE enhances security.
Answer: FALSE
Difficulty: Basic
Question: 15e
Objective: Describe e-mail standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
52) When an e-mail user encrypts an outgoing message with SSL/TLS, how far will this encryption extend?
A) to the sender’s e-mail server
B) to the receiver’s e-mail server
C) to the receiver’s client host
D) to an application program on the receiver’s client host
Answer: A
Difficulty: Basic
Question: 16a
Objective: Describe e-mail standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
53) In e-mail, SSL/TLS provides ________.
A) link encryption
B) end-to-end encryption
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Basic
Question: 16b
Objective: Describe e-mail standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
54) Why is link-by-link encryption for confidentiality not fully secure even if there is encryption for confidentiality in all links along the way?
A) There cannot be confidentiality on each link.
B) Devices along the way may not be secure.
C) both A and B
D) neither A nor B
Answer: B
Difficulty: Deeper
Question: 16c
Objective: Describe e-mail standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
55) Which of the following provides end-to-end encryption?
A) SSL/TLS
B) S/MIME
C) both A and B
D) neither A nor B
Answer: B
Difficulty: Basic
Question: 16d
Objective: Describe e-mail standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
56) What is the universal standard for end-to-end encryption?
A) SSL/TLS
B) IPsec
C) S/MIME
D) There is no universal standard for end-to-end encryption.
Answer: D
Difficulty: Basic
Question: 16e
Objective: Describe e-mail standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
57) VoIP is an acronym for ________.
A) Voice over IP
B) Video over IP
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Deeper
Question: 17
Objective: Describe VoIP standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
58) VoIP ________ uses the Internet Protocol for transmission.
A) always
B) usually
C) seldom
D) never
Answer: A
Difficulty: Basic
Question: 17
Objective: Describe VoIP standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
59) Speech codecs ________.
A) translate human voice signals into digital signals for transmission
B) translate human voice signals into analog signals for transmission
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Basic
Question: 18a
Objective: Describe VoIP standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
60) VoIP users have ________ in their phones or on their computers.
A) media gateways
B) codecs
C) both A and B
D) neither A nor B
Answer: B
Difficulty: Basic
Question: 18a
Objective: Describe VoIP standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
61) Speech codecs vary with respect to ________.
A) compression
B) voice quality
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Basic
Question: 18b
Objective: Describe VoIP standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
62) Telephones that can plug directly into a VoIP network are called PCs with multimedia hardware and added software.
Answer: FALSE
Difficulty: Basic
Question: 19a
Objective: Describe VoIP standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
63) A media gateway connects a client computer, or VoIP phone, to the VoIP network.
Answer: FALSE
Difficulty: Basic
Question: 19b
Objective: Describe VoIP standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
64) A media gateway translates ________ methods.
A) signaling
B) transport
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Deeper
Question: 19b
Objective: Describe VoIP standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
65) SIP is a ________ protocol for VoIP.
A) signaling
B) transport
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Deeper
Question: 20a
Objective: Describe VoIP standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
66) The SIP invite is transmitted to the ________.
A) called party’s SIP proxy server
B) called party’s VoIP phone or computer
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Basic
Question: 20b
Objective: Describe VoIP standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
67) In VoIP traffic, the data field in a signaling packet usually carries codec data.
Answer: FALSE
Difficulty: Deeper
Question: 21a
Objective: Describe VoIP standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
68) For the transport layer, VoIP uses ________ for transport transmission.
A) TCP
B) UDP
C) SIP
D) IP
Answer: B
Difficulty: Basic
Question: 21b
Objective: Describe VoIP standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
69) RTP supports ________.
A) faster transmission speed
B) jitter control
C) both A and B
D) neither A nor B
Answer: B
Difficulty: Deeper
Question: 21c
Objective: Describe VoIP standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
70) Codec data comes after the ________ header in VoIP transport frames.
A) IP
B) TCP
C) UDP
D) RTP
Answer: D
Difficulty: Deeper
Question: 21c
Objective: Describe VoIP standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
71) Which of the following is considered a bigger problem with client/server architecture than peer-to-peer architecture?
A) underutilized processing capacity of client PCs
B) potential for essential data/services to become unavailable because devices providing services are often turned off
C) lack of corporate control
D) none of the above
Answer: A
Difficulty: Deeper
Question: 22a
Objective: Describe why peer-to-peer (P2P) standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
72) P2P applications ________.
A) increase IT control
B) increase user control
C) both A and B
D) neither A nor B
Answer: B
Difficulty: Basic
Question: 22b
Objective: Describe why peer-to-peer (P2P) standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
73) Skype provides ________.
A) Voice over IP
B) Video over IP
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Basic
Question: 23a
Objective: Describe why peer-to-peer (P2P) standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
74) In which VoIP phase does Skype use a server instead of service directly between peers?
A) signaling
B) transport
C) login
D) none of the above
Answer: C
Difficulty: Deeper
Question: 23b
Objective: Describe why peer-to-peer (P2P) standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
75) Skype login is necessary so that the user ________.
A) can find the IP address of a Skype proxy server
B) can find the IP address of a client it wishes to communicate with
C) can find her own Skype address
D) none of the above
Answer: A
Difficulty: Deeper
Question: 23c
Objective: Describe why peer-to-peer (P2P) standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
76) In Skype, a directory search to find the IP address of a client to be called, is done by ________.
A) peers
B) super nodes
C) Skype servers
D) direct communication between the calling and receiving clients
Answer: B
Difficulty: Basic
Question: 23d
Objective: Describe why peer-to-peer (P2P) standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
77) In Skype, signaling is done by ________.
A) peers
B) super nodes
C) direct communication between the calling and receiving clients
D) none of the above
Answer: B
Difficulty: Deeper
Question: 23e
Objective: Describe why peer-to-peer (P2P) standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
78) In Skype, transport is governed by ________.
A) peers providing signaling
B) super nodes
C) Skype servers
D) direct communication between the calling and receiving peers
Answer: D
Difficulty: Deeper
Question: 23f
Objective: Describe why peer-to-peer (P2P) standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
79) In which VoIP phase does Skype implement with peer-to-peer service?
A) signaling
B) login
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Deeper
Question: 23g
Objective: Describe why peer-to-peer (P2P) standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
80) Which phase of VoIP is different in traditional VoIP and Skype?
A) signaling
B) transport
C) login
D) none of the above
Answer: A
Difficulty: Deeper
Question: 23h
Objective: Describe why peer-to-peer (P2P) standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
81) Tor provides confidentiality ________.
A) only between the source host and the first Tor router
B) all the way to the destination host
C) both A and B
D) neither A nor B
Answer: D
Difficulty: Deeper
Question: 24a
Objective: Describe why peer-to-peer (P2P) standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
82) Tor provides the sending host with ________.
A) end-to-end confidentiality
B) anonymity
C) both A and B
D) neither A nor B
Answer: B
Difficulty: Deeper
Question: 24b
Objective: Describe why peer-to-peer (P2P) standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
83) When a message arrives at a Tor router, the router ________.
A) decrypts the arriving message
B) erases its memory of the source address
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Deeper
Question: 24c
Objective: Describe why peer-to-peer (P2P) standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
84) In Tor, ________ can read the content of the message delivered to the destination host.
A) no Tor router
B) all Tor routers
C) the first Tor router
D) the last Tor router
Answer: D
Difficulty: Deeper
Question: 24d
Objective: Describe why peer-to-peer (P2P) standards and security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
PAGE \* MERGEFORMAT 1
Copyright © 2019 Pearson Education, Inc.