Mock Quiz Hub
Dark
Mock Quiz Hub
1
Recent Updates
Added: OS Mid 1 Quiz
Added: OS Mid 2 Quiz
Added: OS Lab 1 Quiz
Check back for more updates!
Time: 00:00
Quiz
Navigate through questions using the controls below
0%
Question 1 of 60
Quiz ID: q1
Which of the following best describes file storage in network applications?
Files are stored locally on each client machine
Files are stored on a server in the network and accessed by clients
Files are stored in the cloud and accessed through web browsers only
Files are distributed across multiple peer nodes
Question 2 of 60
Quiz ID: q2
What year was the File Transfer Protocol (FTP) originally defined?
1970
1980
1985
1990
Question 3 of 60
Quiz ID: q3
Which transport protocol does FTP use?
UDP
TCP
SCTP
HTTP
Question 4 of 60
Quiz ID: q4
How many connections does FTP use and what are they?
One connection on port 21
Two connections: Control on port 21 and Data on port 20
Three connections: Control, Data, and Authentication
One connection that switches between control and data modes
Question 5 of 60
Quiz ID: q5
What form of authentication does FTP provide?
Certificate-based authentication
Token-based authentication
Username and password
Biometric authentication
Question 6 of 60
Quiz ID: q6
Which FTP command is used to retrieve a file from the server?
GET
RETR
Both GET and RETR
DOWNLOAD
Question 7 of 60
Quiz ID: q7
What does the FTP command 'STOR' do?
Store file information
Upload a file to remote host
Create storage directory
Store user credentials
Question 8 of 60
Quiz ID: q8
What does SFTP stand for and what is its main advantage over FTP?
Simple FTP; easier to use
Secure File Transfer Protocol; transfers files over TLS
Super Fast Transfer Protocol; faster transfers
Standard File Transfer Protocol; industry standard
Question 9 of 60
Quiz ID: q9
What is another name for Network File Systems?
Distributed File Systems
Network Attached Storage (NAS)
Storage Area Networks
Cloud Storage Systems
Question 10 of 60
Quiz ID: q10
Which file system is commonly used in Unix environments?
SMB
CIFS
Network File System (NFS)
WebDAV
Question 11 of 60
Quiz ID: q11
Which file systems are commonly used in Windows environments?
NFS and AFS
SMB and CIFS
WebDAV and FTP
SSH and Telnet
Question 12 of 60
Quiz ID: q12
How does a client typically access a network file system?
Through a web browser only
By mounting the file system as a drive
Using command line tools exclusively
Through email attachments
Question 13 of 60
Quiz ID: q13
What characterizes Storage-Area Networks (SANs)?
File-level access for clients
Block-level access for high performance storage shared among servers
Web-based storage interfaces
Peer-to-peer file sharing
Question 14 of 60
Quiz ID: q14
What is a key issue with Internet storage compared to LAN storage?
Higher cost
Limited storage capacity
Internet is slower and less reliable than LAN
Incompatible file formats
Question 15 of 60
Quiz ID: q15
Which protocol is mentioned as being used for Internet storage?
FTP
HTTP
WebDAV
SMTP
Question 16 of 60
Quiz ID: q16
Why was the Domain Name System (DNS) created?
To replace IP addresses entirely
To overcome the limitations of the hosts file as networks grew
To provide email routing
To enable web browsing
Question 17 of 60
Quiz ID: q17
In which RFCs is DNS defined?
RFCs 1034 and 1035
RFCs 959 and 960
RFCs 2821 and 2822
RFCs 793 and 794
Question 18 of 60
Quiz ID: q18
On which port does DNS operate?
Port 21
Port 25
Port 53
Port 80
Question 19 of 60
Quiz ID: q19
What type of naming scheme does DNS use?
Flat naming scheme
Hierarchical, domain-based naming scheme
Sequential numbering system
Random hash-based naming
Question 20 of 60
Quiz ID: q20
Which of the following is NOT a DNS function mentioned in the lecture?
Translating names to IP addresses
Translating names to other information
Translating IP addresses to names
Providing file storage services
Question 21 of 60
Quiz ID: q21
What is an example of DNS translating a name to an IP address?
123.56.88.126 => abc.lk
abc.lk => 123.56.88.126
foolish.lk => the society of foolish people
202.33.192.85 => host85.mycomp.org
Question 22 of 60
Quiz ID: q22
What do authoritative DNS servers provide?
Caching services for faster lookups
Authoritative hostname to IP mappings for organization's servers
Load balancing for web servers
Backup storage for DNS records
Question 23 of 60
Quiz ID: q23
What is another name for a Local Name Server?
Root name server
Authoritative name server
Default name server
Primary name server
Question 24 of 60
Quiz ID: q24
What role does a local name server play in DNS queries?
It stores all DNS records globally
It acts as a proxy and forwards queries into the hierarchy
It only handles reverse DNS lookups
It manages domain registrations
Question 25 of 60
Quiz ID: q25
What is a key advantage of using local name servers?
They provide better security
They reduce lookup latency for commonly searched hostnames
They cost less to maintain
They have unlimited storage capacity
Question 26 of 60
Quiz ID: q26
How do Peer-to-Peer (P2P) applications differ from the client-server model?
P2P applications are always faster
P2P has no specified client or server, with all peers having equal status
P2P applications only work on mobile devices
P2P requires a central database
Question 27 of 60
Quiz ID: q27
Which of the following is NOT mentioned as a P2P application?
File Sharing
Instant Messaging
Online Gaming
Web Browsing
Question 28 of 60
Quiz ID: q28
In the P2P file sharing example, what protocol is used for file transfer?
FTP
SFTP
HTTP
TCP
Question 29 of 60
Quiz ID: q29
What makes P2P file sharing highly scalable?
Centralized servers handle all requests
All peers are servers, so capacity grows with users
Files are compressed before sharing
Only selected peers serve files
Question 30 of 60
Quiz ID: q30
In the original Napster design, what information does a peer provide to the central server when connecting?
Username and password only
IP address and content
File sizes and checksums
Download and upload speeds
Question 31 of 60
Quiz ID: q31
What are the main problems with centralized directory P2P systems like original Napster?
Slow file transfers and limited storage
Single point of failure, performance bottleneck, and copyright infringement issues
High bandwidth costs and complex setup
Incompatible file formats and security vulnerabilities
Question 32 of 60
Quiz ID: q32
How does decentralized file sharing (like BitTorrent) differ from centralized systems?
It uses faster protocols
It has no central directory; each file has controller nodes with info about sharing nodes
It only works with specific file types
It requires special hardware
Question 33 of 60
Quiz ID: q33
What is BitTorrent primarily designed for?
Searching for files across the internet
Efficient content distribution using file swarming
Real-time communication between peers
Secure file encryption and storage
Question 34 of 60
Quiz ID: q34
What does a .torrent file contain?
The actual file content to be shared
Metadata about files and information about the tracker
User credentials and permissions
Network routing information
Question 35 of 60
Quiz ID: q35
What is the role of the tracker in BitTorrent?
To store the actual files being shared
To coordinate file distribution by telling peers where to download pieces
To provide search functionality for files
To encrypt files during transfer
Question 36 of 60
Quiz ID: q36
What is the typical size range for pieces in BitTorrent file sharing?
1 KB to 64 KB
64 KB to 1 MB
1 MB to 10 MB
10 MB to 100 MB
Question 37 of 60
Quiz ID: q37
What information does a tracker maintain about peers?
File content and checksums
IP address, port, peer ID, and state information
User preferences and download history
Network bandwidth and connection speed
Question 38 of 60
Quiz ID: q38
What is a 'seeder' in BitTorrent terminology?
A peer that is just starting to download
A peer that provides the complete file
A peer that only downloads but never uploads
A peer that manages the tracker
Question 39 of 60
Quiz ID: q39
What is an 'initial seeder'?
The first peer to join a torrent
A peer that provides the initial copy of the file
A peer with the fastest internet connection
A peer designated by the tracker
Question 40 of 60
Quiz ID: q40
What is a 'leecher' in BitTorrent?
A malicious peer that only downloads
One who is downloading (not a derogatory term)
A peer with slow internet connection
A peer that corrupts file pieces
Question 41 of 60
Quiz ID: q41
When can a leecher start sharing pieces with other downloaders?
Only after downloading the complete file
As soon as it has a complete piece
After downloading 50% of the file
Only with permission from the initial seeder
Question 42 of 60
Quiz ID: q42
How does a leecher become a seeder?
By uploading more than downloading
By obtaining all the pieces and assembling the complete file
By being designated by the tracker
By maintaining the highest upload speed
Question 43 of 60
Quiz ID: q43
What does the initial seeder do with the file before sharing?
Compresses it for faster transfer
Encrypts it for security
Chops it into many pieces
Creates multiple copies
Question 44 of 60
Quiz ID: q44
How does a leecher initially locate other peers sharing a file?
Through direct peer discovery
By broadcasting on the local network
By locating the .torrent file that directs it to a tracker
Through social media networks
Question 45 of 60
Quiz ID: q45
What happens as more downloads occur in BitTorrent?
The network becomes slower
More replicas of pieces become available
The original file gets corrupted
The tracker becomes overloaded
Question 46 of 60
Quiz ID: q46
How does BitTorrent verify file integrity?
Through digital signatures
By verifying checksums
Through peer voting
Using encryption keys
Question 47 of 60
Quiz ID: q47
Which field is NOT typically included in a .torrent file?
URL of the tracker
Piece hashes
User credentials
Piece length
Question 48 of 60
Quiz ID: q48
What does the tracker return to peers requesting information?
File content and metadata
A random list of peers
Search results for files
Network performance statistics
Question 49 of 60
Quiz ID: q49
What is the main advantage of file swarming in BitTorrent?
Better file compression
Enhanced security features
Distributed load and increased download speed through multiple sources
Reduced storage requirements
Question 50 of 60
Quiz ID: q50
In network file storage, what is the primary difference between file-level and block-level access?
File-level is faster than block-level
Block-level provides direct access to storage blocks while file-level accesses complete files
File-level requires special hardware
Block-level is only used in peer-to-peer systems
Question 51 of 60
Quiz ID: q51
What is the primary purpose of the LIST command in FTP?
To list available FTP servers
To list the files in the current remote directory
To list connected users
To list transfer protocols
Question 52 of 60
Quiz ID: q52
Which DNS function involves translating '202.33.192.85' to 'host85.mycomp.org'?
Forward DNS lookup
Reverse DNS lookup
DNS caching
DNS forwarding
Question 53 of 60
Quiz ID: q53
In the DNS hierarchy, what type of servers are at the top level?
Local DNS servers
Authoritative DNS servers
Root DNS servers
Caching DNS servers
Question 54 of 60
Quiz ID: q54
What makes P2P file sharing different from traditional client-server file sharing?
P2P uses different file formats
In P2P, each peer can act as both client and server
P2P is always encrypted
P2P only works with small files
Question 55 of 60
Quiz ID: q55
What is the main limitation of using /etc/hosts file for hostname resolution?
It only works with IP version 4
It requires root privileges to modify
It becomes difficult to update in every host as the network grows
It doesn't support long hostnames
Question 56 of 60
Quiz ID: q56
Which of the following best describes WebDAV?
A peer-to-peer file sharing protocol
A protocol used for Internet storage
A DNS lookup method
A network file system for Unix
Question 57 of 60
Quiz ID: q57
In BitTorrent, what is the significance of piece hashes in the .torrent file?
They determine download priority
They enable verification of piece integrity
They specify file compression methods
They identify peer locations
Question 58 of 60
Quiz ID: q58
What happens when Alice downloads from Bob while others upload from Alice in P2P?
The network becomes congested
File transfer speeds decrease
It demonstrates the scalable nature of P2P systems
It violates P2P protocols
Question 59 of 60
Quiz ID: q59
What is a key characteristic of distributed services mentioned in P2P applications?
They require central coordination
They operate without a single point of control
They only work in local networks
They are slower than centralized services
Question 60 of 60
Quiz ID: q60
According to the lecture, which statement best summarizes the evolution from FTP to modern file storage?
Modern systems only use web browsers for access
Security improvements led to protocols like SFTP, while integration with GUIs improved usability
File sizes have become the limiting factor
All modern systems use peer-to-peer architecture
Quiz Summary
Review your answers before submitting
60
Total Questions
0
Answered
60
Remaining
00:00
Time Spent
Submit Quiz
Back to Questions
Previous
Question 1 of 60
Next
!
Confirm Submission
Cancel
Submit Quiz