Topic Outline
- REMOTE LOGGING
- TELNET
- ELECTRONIC MAIL
- Architecture
- User Agent
- Message Transfer Agent: SMTP
- Message Access Agent: POP and IMAP
- Web-Based Mail
- FILE TRANSFER
- File Transfer Protocol (FTP)
- Anonymous FTP
Begin and Good luck!
1. When both sender and receiver are connected to a mail server via a LAN or a WAN, we need ___________________.
- A) two UAs, two pairs of MTAs, and a pair of MAAs
- B) two UAs, and two pairs of MTAs
- C) two UAs, two pairs of MTAs, and two pairs of MAAs
- D) none of the above
2. The actual mail transfer is done through ____________.
- A) UAs
- B) MTAs
- C) MAAs
- D) none of the above
3. If the sender wants an option enabled by the receiver, it sends a _______ command.
- A) WILL
- B) DO
- C) WONT
- D) none of the above
4. When the sender is connected to the mail server via a LAN or a WAN, we need ______________.
- A) two MTA
- B) two UAs and two pairs of MTAs
- C) two UAs and a pair of MTAs
- D) none of the above
5. The ________ usually contains the sender address, the receiver address, and other information.
- A) message
- B) envelope
- C) both a and b
- D) none of the above
6. NVT uses two sets of characters, one for _____and one for __________.
- A) sending; receiving
- B) request; reply
- C) data; control
- D) none of the above
7. In FTP, ASCII, EBCDIC, and image define an attribute called _______.
- A) file type
- B) data structure
- C) transmission mode
- D) none of the above
8. The third stage in an email transfer needs a ________ protocol.
- A) pull
- B) push
- C) both a and b
- D) none of the above
9. _______ is the standard mechanism provided by TCP/IP for copying a file from one host to another.
- A) TELNET
- B) SMTP
- C) TFTP
- D) none of the above
10. In the _______ mode, each character typed is sent by the client to the server.
- A) default
- B) character
- C) line
- D) none of the above
11. The _______ is software residing on the remote system that allows the remote system to receive characters from a TELNET server.
- A) terminal driver
- B) pseudoterminal driver
- C) TELNET client
- D) none of the above
12. FTP uses the services of ________.
- A) UDP
- B) IP
- C) TCP
- D) none of the above
13. For the control connection, FTP uses the __________ character set.
- A) regular ASCII
- B) EBCDIC
- C) NVT ASCII
- D) none of the above
14. In FTP, when we _______, it is copied from the client to the server.
- A) retrieve a file
- B) store a file
- C) retrieve a list
- D) none of the above
15. During an FTP session the data connection is opened _______.
- A) exactly once
- B) exactly twice
- C) as many times as necessary
- D) none of the above
16. In FTP, _______ is the service type used by the IP protocol because this is an interactive connection between a user (human) and a server.
- A) maximize throughput
- B) minimize delay
- C) minimize error
- D) none of the above
17. When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login.
- A) local
- B) remote
- C) temporary
- D) none of the above
18. The third stage in an email transfer uses a(n) ________ protocol.
- A) UA
- B) MTA
- C) MAA
- D) none of the above
19. TELNET uses only one TCP connection. The server uses ________ port and the client uses ________ port.
- A) a well-known; another well-known
- B) an ephemeral; another ephemeral
- C) a well-known; an ephemeral
- D) none of the above
20. For control, NVT uses US ASCII characters with the highest order bit set to ______.
- A) 1
- B) 0
- C) a or b
- D) none of the above
21. The formal protocol that defines the MTA client and server in the Internet is called ___________.
- A) SMTP
- B) SNMP
- C) TELNET
- D) none of the above
22. _________ is a supplementary protocol that allows non-ASCII data to be sent through email.
- A) JPEG
- B) MPEG
- C) MIME
- D) none of the above
23. Which of the following services is not provided by a UA?
- A) composing messages
- B) reading messages
- C) replying messages
- D) all are
24. If the sender wants to enable an option, it sends a _______ command.
- A) WILL
- B) DO
- C) WONT
- D) none of the above
25. In FTP, when we _______, it is copied from the server to the client.
- A) retrieve a file
- B) retrieve a list
- C) a and c
- D) none of the above
26. TELNET is an abbreviation for ____________.
- A) terminal network
- B) telephone network
- C) telecommunication network
- D) none of the above
27. When a user logs into a local time-sharing system, it is called ________ login.
- A) local
- B) remote
- C) temporary
- D) none of the above
28. Which part of the mail created by the UA contains the sender and receiver names?
- A) envelope
- B) address
- C) header
- D) none of the above
29. ________ is part of a local hard drive, a special file with permission restrictions.
- A) A message
- B) A response
- C) An agent
- D) none of the above
30. ________ provides service to the user to make the process of sending and receiving a message easier.
- A) An MTA
- B) An MAA
- C) A UA
- D) none of the above
31. The message contains the ________ and the __________.
- A) header; envelop
- B) header; body
- C) envelop; body
- D) none of the above
32. In the ____ mode, line editing (echoing, character erasing, line erasing, and so on) is done by the client.
- A) default
- B) character
- C) line
- D) none of the above
33. The MIME _______ header uses text to describe the type of data in the body of the message.
- A) content-type
- B) content-transfer-encoding
- C) content-description
- D) none of the above
34. If the sender wants to disable an option, it sends a _______ command.
- A) WILL
- B) DO
- C) WONT
- D) none of the above
35. SMTP is a __________protocol.
- A) pull
- B) push
- C) both a and b
- D) none of the above
36. In FTP, there are three types of _______: stream, block, and compressed.
- A) file types
- B) data structures
- C) transmission modes
- D) none of the above
37. For data, NVT uses US ASCII characters with the highest order bit set to ______.
- A) 1
- B) 0
- C) a or b
- D) none of the above
38. The _______ translates NVT characters into a form acceptable by the remote operating system.
- A) terminal driver
- B) TELNET client
- C) TELNET server
- D) none of the above
39. When the sender and the receiver of an email are on the same system, we need only ___________.
- A) one UA
- B) two UAs
- C) one UA and one MTA
- D) none of the above
40. In the Internet, the email address consists of two parts: a _______ and a _______.
- A) local part; domain name
- B) global part; domain name
- C) label; domain name
- D) none of the above
41. To distinguish data from control characters, each sequence of control characters is preceded by a special control character called ________.
- A) ICA
- B) IAC
- C) AIC
- D) none of the above
42. When the sender and the receiver of an email are on different systems, we need only _____________.
- A) one MTA
- B) two UAs
- C) two UAs and one pair of MTAs
- D) none of the above
43. During an FTP session the control connection is opened _______.
- A) exactly once
- B) exactly twice
- C) as many times as necessary
- D) none of the above
44. If the sender wants an option disabled by the receiver, it sends a _______ command.
- A) WILL
- B) DO
- C) DONT
- D) none of the above
45. The _______ translates local characters into NVT form.
- A) terminal driver
- B) TELNET client
- C) TELNET server
- D) none of the above
46. Currently two message access protocols are available: _______ and _________.
- A) POP3; IMAP2
- B) POP4; IMAP1
- C) POP3; IMAP4
- D) none of the above
47. TELNET is a ________ client-server application program.
- A) specific-purpose
- B) general-purpose
- C) both a and b
- D) none of the above
48. In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _______.
- A) file types
- B) data structures
- C) transmission modes
- D) none of the above
49. The process of transferring a mail message occurs in ________ phases.
- A) two
- B) four
- C) five
- D) none of the above
50. In FTP, the well-known port ____ is used for the control connection and the well-known port ________ for the data connection.
- A) 21; 22
- B) 21; 20
- C) 20; 21
- D) none of the above
51. In the _______ mode, the echoing is done by the client.
- A) default
- B) character
- C) line
- D) none of the above
52. There are two types of user agents: _________ and ___________.
- A) command-driven; data-driven
- B) command-driven; GUI-based
- C) command-based and data-based
- D) none of the above
53. _______ is more powerful and complex than _______.
- A) POP3; IMAP4
- B) IMAP4; POP3
- C) SMTP; POP3
- D) none of the above
Back to Homepage
Note: Check your works. Remote Logging, Electronic Mail, and File Transfer - MCQs Answers
0 comments: Post Yours! Read Comment Policy ▼
PLEASE NOTE:
I have Zero Tolerance to Spam. It will be deleted immediately upon review.
Post a Comment