The Full Wiki

Hypertext Transfer Protocol: Quiz


Question 1: In other words, they should not have side effects, beyond relatively harmless effects such as logging, ________, the serving of banner advertisements or incrementing a web counter.
CPU cacheOperating systemCacheComputer data storage

Question 2: In the exchange, the client begins by making a clear-text request, which is later upgraded to ________ (TLS).
Transport Layer SecurityIPsecSecure ShellInternet Relay Chat

Question 3: Its use for retrieving inter-linked resources, called hypertext documents, led to the establishment of the World Wide Web in 1990 by English physicist ________.
Michael A. JacksonSoftware engineeringOntology (information science)Tim Berners-Lee

Question 4: It establishes a Transmission Control Protocol (TCP) connection to a particular port on a host (typically port 80; see ________).
Secure ShellList of TCP and UDP port numbersFile Transfer ProtocolInternet Relay Chat

Question 5: There are currently two methods of establishing a secure HTTP connection: the ________ URI scheme and the HTTP 1.1 Upgrade header, introduced by RFC 2817.
Hypertext Transfer ProtocolInternet Relay ChatHTTP SecureURI scheme

Question 6: The server returns a 426 status-code because 400 level codes indicate a client failure (see ________), which correctly alerts legacy clients that the failure was client-related.
Hypertext Transfer ProtocolHTTP cookieHTTP SecureList of HTTP status codes

Question 7: The responding server, which stores or creates resources such as ________ files and images, may be called the origin server.
Portable Document FormatECMAScriptOpenDocumentHTML

Question 8: Content-Type specifies the ________ of the data conveyed by the http message, while Content-Length indicates its length in bytes.
MPEG-4 Part 14Graphics Interchange FormatOggInternet media type

Question 9: Resources to be accessed by HTTP are identified using Uniform Resource Identifiers (URIs)—or, more specifically, Uniform Resource Locators (URLs)—using the http or https ________.
HTTP SecureURI schemeHypertext Transfer ProtocolAbout: URI scheme

Question 10: In HTTP, ________ or spiders typically act as clients, while an application running on the computer hosting the web site acts as a server.
Web browserInternet ExplorerOpera (web browser)Internet Explorer 3

Got something to say? Make a comment.
Your name
Your email address