MCA/Computer Network MCA Question MCQ Set 5 Sample Test,Sample questions

Question:
 An SMTP session may not include _______

1.zero SMTP transaction

2. one SMTP transaction

3.more than one SMTP transaction

4.one HTTP transaction


Question:
 Choose the statement which is wrong incase of SMTP?

1. It requires message to be in 7bit ASCII format

2.It is a pull protocol

3. It transfers files from one mail server to another mail server

4. SMTP is responsible for the transmission of the mail through the internet


Question:
 DHCP (dynamic host configuration protocol) provides __________ to the client.

1. IP address

2.MAC address

3.Url

4.none of the mentioned


Question:
 In SMTP, the command to write receiver’s mail address is written with the command ____

1.SEND TO

2.RCPT TO

3.MAIL TO

4.RCVR TO


Question:
 Internet mail places each object in ______

1.Separate messages for each object

2.One message

3.Varies with number of objects

4.Multiple messages for each object


Question:
 SMTP connections secured by SSL are known as ________

1. SMTPS

2.SSMTP

3. SNMP

4. STARTTLS


Question:
 SMTP defines _______

1.message transport

2. message encryption

3.message content

4.message password


Question:
 The domain name system is maintained by _______

1.distributed database system

2. a single server

3.a single computer

4.none of the mentioned


Question:
 The right to use a domain name is delegated by domain name registers which are accredited by ______

1. internet architecture board

2. internet society

3. internet research task force

4. internet corporation for assigned names and numbers


Question:
 The underlying Transport layer protocol used by SMTP is _____

1. TCP

2.UDP

3. Either TCP or UDP

4.IMAP


Question:
A DNS client is called ____

1. DNS updater

2.DNS resolver

3.DNS handler

4.none of the mentioned


Question:
A session may include ______

1. Zero or more SMTP transactions

2.Exactly one SMTP transactions

3.Always more than one SMTP transactions

4.Number of SMTP transactions cant be determined


Question:
An email client needs to know the _________ of its initial SMTP server.

1.IP address

2.MAC address

3.URL

4.Name


Question:
DHCP is used for ______

1.IPv6

2. IPv4

3. Both IPv6 and IPv4

4.none of the mentioned


Question:
DHCP uses UDP port _________ for sending data to the server.

1. 66

2. 67

3.68

4.69


Question:
DNS database contains _______

1.name server records

2. hostname-to-address records

3.hostname aliases

4.all of the mentioned


Question:
Expansion of SMTP is ________

1.Simple Mail Transfer Protocol

2. Simple Message Transfer Protocol

3.Simple Mail Transmission Protocol

4.Simple Message Transmission Protocol


Question:
Find the FTP reply whose message is wrongly matched.

1. 331 – Username OK, password required

2.425 – Can’t open data connection

3.452 – Error writing file

4.452 – Can’t open data connection


Question:
If a server has no clue about where to find the address for a hostname then _______

1.server asks to the root server

2.server asks to its adjcent server

3. request is not processed

4. None of the mentioned


Question:
If you have to send multimedia data over SMTP it has to be encoded into _______

1. Binary

2. Signal

3.ASCII

4.Hash


Question:
IP assigned for a client by DHCP server is

1.for a limited period

2.for an unlimited period

3.not time dependent

4. None of the mentioned


Question:
SCP protocol is evolved from __________ over SSH.

1.RCP protocol

2.DHCP protocol

3.MGCP protocol

4.GCP protocol


Question:
Secure shell (SSH) network protocol is used for _____

1.secure data communication

2.remote command-line login

3. remote command execution

4.all of the mentioned


Question:
Servers handle requests for other domains _______

1. directly

2. by contacting remote DNS server

3. by contacting remote DNS server

4.none of the mentioned


Question:
Simple mail transfer protocol (SMTP) utilizes _________ as the transport layer protocol for electronic mail transfer.

1.TCP

2.UDP

3. DCCP

4.SCTP


Question:
SMTP is not used to deliver messages to ______

1. user’s terminal

2.user’s mailbox

3.user’s word processor

4.user’s email client


Question:
SMTP uses which of the following TCP port?

1.22

2. 23

3.21

4.25


Question:
SSH can be used in only _________

1.unix-like operating systems

2.windows

3.both unix-like and windows systems

4.none of the mentioned


Question:
SSH uses ___________ to authenticate the remote computer.

1. public-key cryptography

2.private-key cryptography

3.any of public-key or private-key

4.both public-key & private-key


Question:
SSH-2 does not contain ________

1.transport layer

2.user authentication layer

3.physical layer

4.connection layer


Question:
The commands, from client to server, and replies, from server to client, are sent across the control connection in ________ bit ASCII format.

1.8

2.7

3.3

4.5


Question:
The data transfer mode of FTP, in which all the fragmenting has to be done by TCP is _______

1.Stream mode

2.Block mode

3. Compressed mode

4.message mode


Question:
The DHCP server _______

1.maintains a database of available IP addresses

2.maintains the information about client configuration parameters

3. grants a IP address when receives a request from a client

4.all of the mentioned


Question:
The entire hostname has a maximum of ________

1.255 characters

2. 127 characters

3. 63 characters

4.31 characters


Question:
The password is sent to the server using ________ command.

1.PASSWD

2.PASS

3.PASSWORD

4.PWORD


Question:
Typically the TCP port used by SMTP is _____

1.25

2.35

3.50

4.15


Question:
User agent does not support this ______

1.Composing messages

2.Reading messages

3.Replying messages

4.Routing messages


Question:
What is on-demand mail relay (ODMR)?

1. protocol for SMTP security

2.an SMTP extension

3. protocol for web pages

4.protocol for faster mail transfer


Question:
When the sender and the receiver of an email are on different systems, we need only _____

1. One MTA

2.Two UAs

3.Two UAs and one MTA

4.Two UAs and two MTAs


Question:
Which of the following is an example of user agents for e-mail?

1.Microsoft Outlook

2.Facebook

3.Google

4.Tumblr


Question:
Which one of the following allows client to update their DNS entry as their IP address change?

1.dynamic DNS

2.mail transfer agent

3. authoritative name server

4. None of the mentioned


Question:
Which one of the following authentication method is used by SSH?

1. public-key

2. host based

3.password

4.all of the mentioned


Question:
Which one of the following feature was present in SSH protocol, version 1?

1.password changing

2.periodic replacement of session keys

3.support for public-key certificates

4.none of the mentioned


Question:
Which one of the following is a file transfer protocol using SSH?

1. SCP

2.SFTP

3.Rsync

4.all of the mentioned


Question:
Which one of the following is an SMTP server configured in such a way that anyone on the internet can send e-mail through it?

1. open mail relay

2. wide mail reception

3. open mail reception

4. short mail reception


Question:
Which one of the following is not true?

1. multiple hostnames may correspond to a single IP address

2.a single hostname may correspond to many IP addresses

3. a single hostname may correspond to a single IP address

4.none of the mentioned


Question:
Which one of the following protocol can be used for login to a shell on a remote host except SSH?

1. telnet

2. rlogin

3.both telnet and rlogin

4.none of the mentioned


Question:
Which one of the following protocol is used to receive mail messages?

1. SMTP

2.Post Office Protocol (POP)

3. Internet Message Access Protocol (IMAP)

4. FTP


Question:
Which standard TCP port is assigned for contacting SSH servers?

1. port 21

2. port 22

3.port 23

4. port 24


Question:
Wildcard domain names start with label _______

1.@

2.*

3. &

4.#


More MCQS

  1. Computer Network MCA Question MCQ Set 1
  2. Computer Network MCA Question MCQ Set 2
  3. Computer Network MCA Question MCQ Set 3
  4. Computer Network MCA Question MCQ Set 4
  5. Computer Network MCA Question MCQ Set 5
  6. Computer Network MCA Question MCQ Set 6
  7. Computer Network MCA Question MCQ Set 7
  8. Computer Network MCA Question MCQ Set 8
  9. Computer Network MCA Question MCQ Set 9
  10. Computer Network MCA Question MCQ Set 10
  11. Computer Network MCA Question MCQ Set 11
  12. Computer Network MCA Question MCQ Set 12
  13. Computer Network MCA Question MCQ Set 13
  14. Computer Network MCA Question MCQ Set 14
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!