

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Electrical Engineering , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Science in Information Technology FY (BSc IT) , Bachelor of Science in Information Technology SY (BSc IT) .
401. |
Which one of the following protocol is used to receive mail messages? |
A. | smtp |
B. | post office protocol (pop) |
C. | internet message access protocol (imap) |
D. | ftp |
Answer» D. ftp |
402. |
What is on-demand mail relay (ODMR)? |
A. | protocol for smtp security |
B. | an smtp extension |
C. | protocol for web pages |
D. | protocol for faster mail transfer |
Answer» B. an smtp extension |
403. |
An email client needs to know the _________ of its initial SMTP server. |
A. | ip address |
B. | mac address |
C. | url |
D. | name |
Answer» A. ip address |
404. |
An SMTP session may not include _______ |
A. | zero smtp transaction |
B. | one smtp transaction |
C. | more than one smtp transaction |
D. | one http transaction |
Answer» D. one http transaction |
405. |
SMTP defines _______ |
A. | message transport |
B. | message encryption |
C. | message content |
D. | message password |
Answer» A. message transport |
406. |
SMTP is not used to deliver messages to ______ |
A. | user’s terminal |
B. | user’s mailbox |
C. | user’s word processor |
D. | user’s email client |
Answer» C. user’s word processor |
407. |
The entire hostname has a maximum of ___________ |
A. | 255 characters |
B. | 127 characters |
C. | 63 characters |
D. | 31 characters |
Answer» A. 255 characters |
408. |
A DNS client is called _________ |
A. | dns updater |
B. | dns resolver |
C. | dns handler |
D. | none of the mentioned |
Answer» B. dns resolver |
409. |
Servers handle requests for other domains _______ |
A. | directly |
B. | by contacting remote dns server |
C. | it is not possible |
D. | none of the mentioned |
Answer» B. by contacting remote dns server |
410. |
DNS database contains _______ |
A. | name server records |
B. | hostname-to-address records |
C. | hostname aliases |
D. | all of the mentioned |
Answer» D. all of the mentioned |
411. |
If a server has no clue about where to find the address for a hostname then _______ |
A. | server asks to the root server |
B. | server asks to its adjcent server |
C. | request is not processed |
D. | none of the mentioned |
Answer» A. server asks to the root server |
412. |
Wildcard domain names start with label _______ |
A. | @ |
B. | * |
C. | & |
D. | # |
Answer» B. * |
413. |
The domain name system is maintained by _______ |
A. | distributed database system |
B. | a single server |
C. | a single computer |
D. | none of the mentioned |
Answer» A. distributed database system |
414. |
Secure shell (SSH) network protocol is used for __________ |
A. | secure data communication |
B. | remote command-line login |
C. | remote command execution |
D. | all of the mentioned |
Answer» D. all of the mentioned |
415. |
SSH can be used in only _____________ |
A. | unix-like operating systems |
B. | windows |
C. | both unix-like and windows systems |
D. | none of the mentioned |
Answer» C. both unix-like and windows systems |
416. |
SSH uses ___________ to authenticate the remote computer. |
A. | public-key cryptography |
B. | private-key cryptography |
C. | any of public-key or private-key |
D. | both public-key & private-key |
Answer» A. public-key cryptography |
417. |
Which standard TCP port is assigned for contacting SSH servers? |
A. | port 21 |
B. | port 22 |
C. | port 23 |
D. | port 24 |
Answer» B. port 22 |
418. |
Which one of the following is a file transfer protocol using SSH? |
A. | scp |
B. | sftp |
C. | rsync |
D. | all of the mentioned |
Answer» D. all of the mentioned |
419. |
SSH-2 does not contain ______________ |
A. | transport layer |
B. | user authentication layer |
C. | physical layer |
D. | connection layer |
Answer» C. physical layer |
420. |
Which one of the following feature was present in SSH protocol, version 1? |
A. | password changing |
B. | periodic replacement of session keys |
C. | support for public-key certificates |
D. | none of the mentioned |
Answer» D. none of the mentioned |
421. |
SCP protocol is evolved from __________ over SSH. |
A. | rcp protocol |
B. | dhcp protocol |
C. | mgcp protocol |
D. | gcp protocol |
Answer» A. rcp protocol |
422. |
Which one of the following authentication method is used by SSH? |
A. | public-key |
B. | host based |
C. | password |
D. | all of the mentioned |
Answer» D. all of the mentioned |
423. |
DHCP (dynamic host configuration protocol) provides __________ to the client. |
A. | ip address |
B. | mac address |
C. | url |
D. | none of the mentioned |
Answer» A. ip address |
424. |
DHCP is used for ________ |
A. | ipv6 |
B. | ipv4 |
C. | both ipv6 and ipv4 |
D. | none of the mentioned |
Answer» C. both ipv6 and ipv4 |
425. |
The DHCP server _________ |
A. | maintains a database of available ip addresses |
B. | maintains the information about client configuration parameters |
C. | grants a ip address when receives a request from a client |
D. | all of the mentioned |
Answer» D. all of the mentioned |
426. |
IP assigned for a client by DHCP server is |
A. | for a limited period |
B. | for an unlimited period |
C. | not time dependent |
D. | none of the mentioned |
Answer» A. for a limited period |
427. |
DHCP uses UDP port _________ for sending data to the server. |
A. | 66 |
B. | 67 |
C. | 68 |
D. | 69 |
Answer» B. 67 |
428. |
DHCP client and servers on the same subnet communicate via _________ |
A. | udp broadcast |
B. | udp unicast |
C. | tcp broadcast |
D. | tcp unicast |
Answer» A. udp broadcast |
429. |
WPA2 is used for security in _______ |
A. | ethernet |
B. | bluetooth |
C. | wi-fi |
D. | |
Answer» C. wi-fi |
430. |
VPNs are financially speaking __________ |
A. | always more expensive than leased lines |
B. | always cheaper than leased lines |
C. | usually cheaper than leased lines |
D. | usually more expensive than leased lines |
Answer» C. usually cheaper than leased lines |
431. |
Storage management comprises of _______________ |
A. | san management |
B. | data protection |
C. | disk operation |
D. | all of the mentioned |
Answer» D. all of the mentioned |
432. |
Which of the following is not a storage device? |
A. | switch |
B. | raid arrays |
C. | tape drives |
D. | hub |
Answer» D. hub |
433. |
Which protocols are used for Storage management? |
A. | snmp |
B. | ldap |
C. | pop3 |
D. | mib |
Answer» A. snmp |
434. |
How do Storage administrators ensure secure access to storage devices? |
A. | by using zoning |
B. | by putting a physical lock on the storage device |
C. | by keeping devices shutdown when not in use |
D. | by keeping devices when used |
Answer» A. by using zoning |
435. |
Effective Storage management does not include __________ |
A. | security |
B. | backups |
C. | reporting |
D. | connection |
Answer» D. connection |
436. |
SMI-S Standard uses which of the following? |
A. | java rmi |
B. | cim-xml/http |
C. | corba |
D. | .net |
Answer» B. cim-xml/http |
437. |
Full duplex mode increases the capacity of each domain by ________ |
A. | 10 to 20 mbps |
B. | 20 to 30 mbps |
C. | 30 to 40 mbps |
D. | 40 to 50 mbps |
Answer» A. 10 to 20 mbps |
438. |
Configuration management can be divided into which two subsystems? |
A. | reconfiguration and documentation |
B. | management and configuration |
C. | documentation and dialing up |
D. | configuration and dialing up |
Answer» A. reconfiguration and documentation |
439. |
To use a Simple Network Management System, we need _______ |
A. | servers |
B. | ip |
C. | protocols |
D. | rules |
Answer» D. rules |
440. |
The main difference between SNMPv3 and SNMPv2 is _______ |
A. | management |
B. | integration |
C. | classification |
D. | enhanced security |
Answer» D. enhanced security |
441. |
BER stands for ________ |
A. | basic encoding rules |
B. | basic encoding resolver |
C. | basic encoding rotator |
D. | basic encoding router |
Answer» A. basic encoding rules |
442. |
SNMP is the framework for managing devices in an internet using the ______ |
A. | tcp/ip protocol |
B. | udp |
C. | smtp |
D. | none |
Answer» A. tcp/ip protocol |
443. |
Structure of Management Information (SMI), is the guideline of ________ |
A. | http |
B. | snmp |
C. | url |
D. | mib |
Answer» B. snmp |
444. |
The application layer protocol used by a Telnet application is ________ |
A. | telnet |
B. | ftp |
C. | http |
D. | smtp |
Answer» A. telnet |
445. |
_______ allows you to connect and login to a remote computer |
A. | telnet |
B. | ftp |
C. | http |
D. | smtp |
Answer» A. telnet |
446. |
Telnet is used for _______ |
A. | television on net |
B. | network of telephones |
C. | remote login |
D. | teleshopping site |
Answer» C. remote login |
447. |
Which one of the following is not correct? |
A. | telnet is a general purpose client-server program |
B. | telnet lets user access an application on a remote computer |
C. | telnet can also be used for file transfer |
D. | telnet can be used for remote login |
Answer» C. telnet can also be used for file transfer |
448. |
Which operating mode of telnet is full duplex? |
A. | default mode |
B. | server mode |
C. | line mode |
D. | character mode |
Answer» C. line mode |
449. |
If we want that a character be interpreted by the client instead of server _________ |
A. | interpret as command (iac) escape character has to be used |
B. | control functions has to be disabled |
C. | it is not possible |
D. | cli character has to be used |
Answer» A. interpret as command (iac) escape character has to be used |
450. |
Telnet protocol is used to establish a connection to __________ |
A. | tcp port number 21 |
B. | tcp port number 22 |
C. | tcp port number 23 |
D. | tcp port number 25 |
Answer» C. tcp port number 23 |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.