In this section of Data Communication and Networking – Remote Logging, Electronic Mail, and File Transfer MCQ (Multiple Choice) Based Questions and Answers,it cover the below lists of topics.All the Multiple Choice Questions and Answers (MCQs) have been compiled from the book of Data Communication and Networking by The well known author behrouz forouzan.

This Section covers below lists of topics.

  1. Simple Mail Transfer Protocol (SMTP) MCQs.
  2. Multipurpose Internet Mail Extension (MIME) MCQs.
  3. Post Office Protocol, version 3 (POP3) and Internet Mail Access Protocol, version 4 (IMAP4) MCQs.
  4. File transfer protocol (FTP) – a TCP/IP client-server application MCQs.

PRACTICE IT NOW TO SHARPEN YOUR CONCEPT AND KNOWLEDGE

view hide answers

1. If the sender wants an option enabled by the receiver, it sends a _______ command

  • WILL
  • DO
  • WONT
  • none of the above

2. _______ is the standard mechanism provided by TCP/IP for copying a file from one host to another

  • TELNET
  • SMTP
  • TFTP
  • none of the above

3. FTP uses the services of ________

  • UDP
  • IP
  • TCP
  • none of the above

4. In FTP, the well-known port ____ is used for the control connection and the well-known port ________ for the data connection

  • 21; 22
  • 21; 20
  • 20; 21
  • none of the above

5. In FTP, _______ is the service type used by the IP protocol because this is an interactive connection between a user (human) and a server

  • maximize throughput
  • minimize delay
  • minimize error
  • none of the above

6. For the control connection, FTP uses the __________ character set

  • regular ASCII
  • EBCDIC
  • NVT ASCII
  • none of the above

7. During an FTP session the control connection is opened _______

  • exactly once
  • exactly twice
  • as many times as necessary
  • none of the above

8. During an FTP session the data connection is opened _______

  • exactly once
  • exactly twice
  • as many times as necessary
  • none of the above

9. In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _______

  • file types
  • data structures
  • transmission modes
  • none of the above

10. In FTP, there are three types of _______: stream, block, and compressed

  • file types
  • data structures
  • transmission modes
  • none of the above

11. In FTP, ASCII, EBCDIC, and image define an attribute called _______

  • file type
  • data structure
  • transmission mode
  • none of the above

12. In FTP, when we _______, it is copied from the server to the client.

  • retrieve a file
  • retrieve a list
  • a and c
  • none of the above

13. In FTP, when we _______, it is copied from the client to the server.

  • retrieve a file
  • store a file
  • retrieve a list
  • none of the above

14. ________ is part of a local hard drive, a special file with permission restrictions

  • A message
  • A response
  • An agent
  • None of the above

15. When the sender and the receiver of an email are on the same system, we need only ___________

  • one UA
  • two UAs
  • one UA and one MTA
  • none of the above

16. When the sender and the receiver of an email are on different systems, we need only _____________

  • one MTA
  • two UAs
  • two UAs and one pair of MTAs
  • none of the above

17. When the sender is connected to the mail server via a LAN or a WAN, we need ______________

  • two MTA
  • two UAs and two pairs of MTAs
  • two UAs and a pair of MTAs
  • none of the above

18. When both sender and receiver are connected to a mail server via a LAN or a WAN, we need ___________________

  • two UAs, two pairs of MTAs, and a pair of MAAs
  • two UAs, and two pairs of MTAs
  • two UAs, two pairs of MTAs, and two pairs of MAAs
  • none of the above

19. ________ provides service to the user to make the process of sending and receiving a message easier

  • An MTA
  • An MAA
  • A UA
  • none of the above

20. Which of the following services is not provided by a UA?

  • composing messages
  • reading messages
  • replying messages
  • all are

21. There are two types of user agents: _________ and ___________

  • command-driven; data-driven
  • command-driven; GUI-based
  • command-based and data-based
  • none of the above

22. The ________ usually contains the sender address, the receiver address, and other information

  • message
  • envelope
  • both a and b
  • none of the above

23. The message contains the ________ and the __________

  • header; envelop
  • header; body
  • envelop; body
  • none of the above

24. In the Internet, the email address consists of two parts: a _______ and a _______

  • local part; domain name
  • global part; domain name
  • label; domain name
  • none of the above

25. _________ is a supplementary protocol that allows non-ASCII data to be sent through email.

  • JPEG
  • MPEG
  • MIME
  • none of the above

26. The actual mail transfer is done through ____________

  • UAs
  • MTAs
  • MAAs
  • none of the above

27. The formal protocol that defines the MTA client and server in the Internet is called ___________

  • SMTP
  • SNMP
  • TELNET
  • none of the above

28. The process of transferring a mail message occurs in ________ phases

  • two
  • four
  • five
  • none of the above

29. SMTP is a __________protocol

  • pull
  • push
  • both a and b
  • none of the above

30. The third stage in an email transfer needs a ________ protocol

  • pull
  • push
  • both a and b
  • none of the above

31. The third stage in an email transfer uses a(n) ________ protocol

  • UA
  • MTA
  • MAA
  • none of the above

32. Currently two message access protocols are available: _______ and _________

  • POP3; IMAP2
  • POP4; IMAP1
  • POP3; IMAP4
  • none of the above

33. TELNET is an abbreviation for ____________.

  • terminal network
  • telephone network
  • telecommunication network
  • none of the above

34. TELNET is a ________ client-server application program.

  • specific-purpose
  • general-purpose
  • both a and b
  • none of the above

35. When a user logs into a local time-sharing system, it is called ________ login.

  • local
  • remote
  • temporary
  • none of the above

36. When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login.

  • local
  • remote
  • temporary
  • none of the above

37. NVT uses two sets of characters, one for _____and one for __________

  • sending; receiving
  • request; reply
  • data; control
  • none of the above

38. For data, NVT uses US ASCII characters with the highest order bit set to ______

  • 1
  • 0
  • a or b
  • none of the above

39. For control, NVT uses US ASCII characters with the highest order bit set to ______.

  • 1
  • 0
  • a or b
  • none of the above

40. TELNET uses only one TCP connection. The server uses ________ port and the client uses ________ port

  • a well-known; another well-known
  • an ephemeral; another ephemeral
  • a well-known; an ephemeral
  • none of the above

41. To distinguish data from control characters, each sequence of control characters is preceded by a special control character called ________.

  • ICA
  • IAC
  • AIC
  • none of the above

42. In the _______ mode, the echoing is done by the client.

  • default
  • character
  • line
  • none of the above

43. In the _______ mode, each character typed is sent by the client to the server.

  • default
  • character
  • line
  • none of the above

44. In the ____ mode, line editing (echoing, character erasing, line erasing, and so on) is done by the client

  • default
  • character
  • line
  • none of the above

45. The _______ is software residing on the remote system that allows the remote system to receive characters from a TELNET server

  • terminal driver
  • pseudoterminal driver
  • TELNET client
  • none of the above

46. The _______ translates local characters into NVT form

  • terminal driver
  • TELNET client
  • TELNET server
  • none of the above

47. The _______ translates NVT characters into a form acceptable by the remote operating system.

  • terminal driver
  • TELNET client
  • TELNET server
  • none of the above

48. If the sender wants to disable an option, it sends a _______ command.

  • WILL
  • DO
  • WONT
  • none of the above

49. If the sender wants to enable an option, it sends a _______ command

  • WILL
  • DO
  • WONT
  • none of the above

50. If the sender wants an option disabled by the receiver, it sends a _______ command

  • WILL
  • DO
  • DONT
  • none of the above
Share with : Share on Linkedin Share on Twitter Share on WhatsApp Share on Facebook