In this section of Data Communication and Networking – Remote Logging, Electronic Mail, and File Transfer MCQ (Multiple Choice) Based Questions and Answers,it cover the below lists of topics.All the Multiple Choice Questions and Answers (MCQs) have been compiled from the book of Data Communication and Networking by The well known author behrouz forouzan.
This Section covers below lists of topics.
- Simple Mail Transfer Protocol (SMTP) MCQs.
- Multipurpose Internet Mail Extension (MIME) MCQs.
- Post Office Protocol, version 3 (POP3) and Internet Mail Access Protocol, version 4 (IMAP4) MCQs.
- File transfer protocol (FTP) – a TCP/IP client-server application MCQs.
1. If the sender wants an option enabled by the receiver, it sends a _______ command
- WILL
- DO
- WONT
- none of the above
B. DO
2. _______ is the standard mechanism provided by TCP/IP for copying a file from one host to another
- TELNET
- SMTP
- TFTP
- none of the above
D. none of the above
3. FTP uses the services of ________
- UDP
- IP
- TCP
- none of the above
C. TCP
4. In FTP, the well-known port ____ is used for the control connection and the well-known port ________ for the data connection
- 21; 22
- 21; 20
- 20; 21
- none of the above
B. 21; 20
5. In FTP, _______ is the service type used by the IP protocol because this is an interactive connection between a user (human) and a server
- maximize throughput
- minimize delay
- minimize error
- none of the above
B. minimize delay
6. For the control connection, FTP uses the __________ character set
- regular ASCII
- EBCDIC
- NVT ASCII
- none of the above
C. NVT ASCII
7. During an FTP session the control connection is opened _______
- exactly once
- exactly twice
- as many times as necessary
- none of the above
A. exactly once
8. During an FTP session the data connection is opened _______
- exactly once
- exactly twice
- as many times as necessary
- none of the above
C. as many times as necessary
9. In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _______
- file types
- data structures
- transmission modes
- none of the above
B. data structures
10. In FTP, there are three types of _______: stream, block, and compressed
- file types
- data structures
- transmission modes
- none of the above
C. transmission modes
11. In FTP, ASCII, EBCDIC, and image define an attribute called _______
- file type
- data structure
- transmission mode
- none of the above
A. file type
12. In FTP, when we _______, it is copied from the server to the client.
- retrieve a file
- retrieve a list
- a and c
- none of the above
C. a and c
13. In FTP, when we _______, it is copied from the client to the server.
- retrieve a file
- store a file
- retrieve a list
- none of the above
B. store a file
14. ________ is part of a local hard drive, a special file with permission restrictions
- A message
- A response
- An agent
- None of the above
D. None of the above
15. When the sender and the receiver of an email are on the same system, we need only ___________
- one UA
- two UAs
- one UA and one MTA
- none of the above
B. two UAs
16. When the sender and the receiver of an email are on different systems, we need only _____________
- one MTA
- two UAs
- two UAs and one pair of MTAs
- none of the above
C. two UAs and one pair of MTAs
17. When the sender is connected to the mail server via a LAN or a WAN, we need ______________
- two MTA
- two UAs and two pairs of MTAs
- two UAs and a pair of MTAs
- none of the above
B. two UAs and two pairs of MTAs
18. When both sender and receiver are connected to a mail server via a LAN or a WAN, we need ___________________
- two UAs, two pairs of MTAs, and a pair of MAAs
- two UAs, and two pairs of MTAs
- two UAs, two pairs of MTAs, and two pairs of MAAs
- none of the above
A. two UAs, two pairs of MTAs, and a pair of MAAs
19. ________ provides service to the user to make the process of sending and receiving a message easier
- An MTA
- An MAA
- A UA
- none of the above
C. A UA
20. Which of the following services is not provided by a UA?
- composing messages
- reading messages
- replying messages
- all are
D. all are
21. There are two types of user agents: _________ and ___________
- command-driven; data-driven
- command-driven; GUI-based
- command-based and data-based
- none of the above
B. command-driven; GUI-based
22. The ________ usually contains the sender address, the receiver address, and other information
- message
- envelope
- both a and b
- none of the above
B. envelope
23. The message contains the ________ and the __________
- header; envelop
- header; body
- envelop; body
- none of the above
B. header; body
24. In the Internet, the email address consists of two parts: a _______ and a _______
- local part; domain name
- global part; domain name
- label; domain name
- none of the above
A. local part; domain name
25. _________ is a supplementary protocol that allows non-ASCII data to be sent through email.
- JPEG
- MPEG
- MIME
- none of the above
C. MIME
26. The actual mail transfer is done through ____________
- UAs
- MTAs
- MAAs
- none of the above
B. MTAs
27. The formal protocol that defines the MTA client and server in the Internet is called ___________
- SMTP
- SNMP
- TELNET
- none of the above
A. SMTP
28. The process of transferring a mail message occurs in ________ phases
- two
- four
- five
- none of the above
D. none of the above
29. SMTP is a __________protocol
- pull
- push
- both a and b
- none of the above
B. push
30. The third stage in an email transfer needs a ________ protocol
- pull
- push
- both a and b
- none of the above
A. pull
31. The third stage in an email transfer uses a(n) ________ protocol
- UA
- MTA
- MAA
- none of the above
C. MAA
32. Currently two message access protocols are available: _______ and _________
- POP3; IMAP2
- POP4; IMAP1
- POP3; IMAP4
- none of the above
C. POP3; IMAP4
33. TELNET is an abbreviation for ____________.
- terminal network
- telephone network
- telecommunication network
- none of the above
A. terminal network
34. TELNET is a ________ client-server application program.
- specific-purpose
- general-purpose
- both a and b
- none of the above
B. general-purpose
35. When a user logs into a local time-sharing system, it is called ________ login.
- local
- remote
- temporary
- none of the above
A. local
36. When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login.
- local
- remote
- temporary
- none of the above
B. remote
37. NVT uses two sets of characters, one for _____and one for __________
- sending; receiving
- request; reply
- data; control
- none of the above
C. data; control
38. For data, NVT uses US ASCII characters with the highest order bit set to ______
- 1
- 0
- a or b
- none of the above
B. 0
39. For control, NVT uses US ASCII characters with the highest order bit set to ______.
- 1
- 0
- a or b
- none of the above
A. 1
40. TELNET uses only one TCP connection. The server uses ________ port and the client uses ________ port
- a well-known; another well-known
- an ephemeral; another ephemeral
- a well-known; an ephemeral
- none of the above
C. a well-known; an ephemeral
41. To distinguish data from control characters, each sequence of control characters is preceded by a special control character called ________.
- ICA
- IAC
- AIC
- none of the above
B. IAC
42. In the _______ mode, the echoing is done by the client.
- default
- character
- line
- none of the above
A. default
43. In the _______ mode, each character typed is sent by the client to the server.
- default
- character
- line
- none of the above
B. character
44. In the ____ mode, line editing (echoing, character erasing, line erasing, and so on) is done by the client
- default
- character
- line
- none of the above
C. line
45. The _______ is software residing on the remote system that allows the remote system to receive characters from a TELNET server
- terminal driver
- pseudoterminal driver
- TELNET client
- none of the above
B. pseudoterminal driver
46. The _______ translates local characters into NVT form
- terminal driver
- TELNET client
- TELNET server
- none of the above
B. TELNET client
47. The _______ translates NVT characters into a form acceptable by the remote operating system.
- terminal driver
- TELNET client
- TELNET server
- none of the above
C. TELNET server
48. If the sender wants to disable an option, it sends a _______ command.
- WILL
- DO
- WONT
- none of the above
C. WONT
49. If the sender wants to enable an option, it sends a _______ command
- WILL
- DO
- WONT
- none of the above
A. WILL
50. If the sender wants an option disabled by the receiver, it sends a _______ command
- WILL
- DO
- DONT
- none of the above
C. DONT