Business Data Networks And Security 9th Edition By Raymond R. Pank – Test Bank
Chapter 11 Networked Applications
1) A networked application is an application that requires a network to operate.
2) The way in which application layer functions are spread among computers to deliver service to users is called ________.
A) distributed processing
B) peer-to-peer computing
C) client/server computing
D) an application architecture
3) Users are primarily concerned about the ________ layer.
4) The advance that made the client/server application architecture possible was ________.
A) the Internet
B) client processing power
C) application sophistication
D) input/output methods
5) If a hacker takes over an application, he or she gets all the privileges of the application on the computer.
6) Having all privileges on a computer is known as having ________.
A) all access
B) total control
C) root privileges
D) All of the above
7) RFC 822 and RFC 2822 standards govern ________.
A) plain text content of e-mail messages
B) HTTP page contents
C) HTML commands and content
D) plain text, graphic, and video content of e-mail messages
8) E-mail bodies that have non-English text use ________.
A) RFC 822 and RFC 2822
9) A traditional e-mail user sending messages to his or her mail server would most likely use ________.
A) the IMAP standard
B) the POP standard
C) either the IMAP or POP standard
D) the SMTP standard
10) Mail servers communicate with each other by using ________.
C) RFC 2822
11) If you are using a Web-enabled e-mail system ________.
A) you have to install a special Web-enabled e-mail client to access your e-mail
B) you access and send mail by using a Web browser
C) you are more likely to be susceptible to viruses being introduced on your computer
D) you are unable to send/receive e-mail messages containing information other than letters or numbers