R4RIN
Articles
Java 8
MCQS
MCA MCQ Quiz Hub
Computer Network MCA Question MCQ Set 5
Choose a topic to test your knowledge and improve your MCA skills
1. The commands, from client to server, and replies, from server to client, are sent across the control connection in ________ bit ASCII format.
8
7
3
5
2. Find the FTP reply whose message is wrongly matched.
331 – Username OK, password required
425 – Can’t open data connection
452 – Error writing file
452 – Can’t open data connection
3. The data transfer mode of FTP, in which all the fragmenting has to be done by TCP is _______
Stream mode
Block mode
Compressed mode
message mode
4. The password is sent to the server using ________ command.
PASSWD
PASS
PASSWORD
PWORD
5. If you have to send multimedia data over SMTP it has to be encoded into _______
Binary
Signal
ASCII
Hash
6. Expansion of SMTP is ________
Simple Mail Transfer Protocol
Simple Message Transfer Protocol
Simple Mail Transmission Protocol
Simple Message Transmission Protocol
7. In SMTP, the command to write receiver’s mail address is written with the command ____
SEND TO
RCPT TO
MAIL TO
RCVR TO
8. The underlying Transport layer protocol used by SMTP is _____
TCP
UDP
Either TCP or UDP
IMAP
9. Choose the statement which is wrong incase of SMTP?
It requires message to be in 7bit ASCII format
It is a pull protocol
It transfers files from one mail server to another mail server
SMTP is responsible for the transmission of the mail through the internet
10. Internet mail places each object in ______
Separate messages for each object
One message
Varies with number of objects
Multiple messages for each object
11. Typically the TCP port used by SMTP is _____
25
35
50
15
12. A session may include ______
Zero or more SMTP transactions
Exactly one SMTP transactions
Always more than one SMTP transactions
Number of SMTP transactions cant be determined
13. Which of the following is an example of user agents for e-mail?
Microsoft Outlook
Facebook
Google
Tumblr
14. When the sender and the receiver of an email are on different systems, we need only _____
One MTA
Two UAs
Two UAs and one MTA
Two UAs and two MTAs
15. User agent does not support this ______
Composing messages
Reading messages
Replying messages
Routing messages
16. Simple mail transfer protocol (SMTP) utilizes _________ as the transport layer protocol for electronic mail transfer.
TCP
UDP
DCCP
SCTP
17. SMTP connections secured by SSL are known as ________
SMTPS
SSMTP
SNMP
STARTTLS
18. SMTP uses which of the following TCP port?
22
23
21
25
19. Which one of the following protocol is used to receive mail messages?
SMTP
Post Office Protocol (POP)
Internet Message Access Protocol (IMAP)
FTP
20. What is on-demand mail relay (ODMR)?
protocol for SMTP security
an SMTP extension
protocol for web pages
protocol for faster mail transfer
21. An email client needs to know the _________ of its initial SMTP server.
IP address
MAC address
URL
Name
22. An SMTP session may not include _______
zero SMTP transaction
one SMTP transaction
more than one SMTP transaction
one HTTP transaction
23. SMTP defines _______
message transport
message encryption
message content
message password
24. Which one of the following is an SMTP server configured in such a way that anyone on the internet can send e-mail through it?
open mail relay
wide mail reception
open mail reception
short mail reception
25. SMTP is not used to deliver messages to ______
user’s terminal
user’s mailbox
user’s word processor
user’s email client
26. The entire hostname has a maximum of ________
255 characters
127 characters
63 characters
31 characters
27. A DNS client is called ____
DNS updater
DNS resolver
DNS handler
none of the mentioned
28. Servers handle requests for other domains _______
directly
by contacting remote DNS server
by contacting remote DNS server
none of the mentioned
29. DNS database contains _______
name server records
hostname-to-address records
hostname aliases
all of the mentioned
30. If a server has no clue about where to find the address for a hostname then _______
server asks to the root server
server asks to its adjcent server
request is not processed
None of the mentioned
31. Which one of the following allows client to update their DNS entry as their IP address change?
dynamic DNS
mail transfer agent
authoritative name server
None of the mentioned
32. Wildcard domain names start with label _______
@
*
&
#
33. The right to use a domain name is delegated by domain name registers which are accredited by ______
internet architecture board
internet society
internet research task force
internet corporation for assigned names and numbers
34. The domain name system is maintained by _______
distributed database system
a single server
a single computer
none of the mentioned
35. Which one of the following is not true?
multiple hostnames may correspond to a single IP address
a single hostname may correspond to many IP addresses
a single hostname may correspond to a single IP address
none of the mentioned
36. Secure shell (SSH) network protocol is used for _____
secure data communication
remote command-line login
remote command execution
all of the mentioned
37. SSH can be used in only _________
unix-like operating systems
windows
both unix-like and windows systems
none of the mentioned
38. SSH uses ___________ to authenticate the remote computer.
public-key cryptography
private-key cryptography
any of public-key or private-key
both public-key & private-key
39. Which standard TCP port is assigned for contacting SSH servers?
port 21
port 22
port 23
port 24
40. Which one of the following protocol can be used for login to a shell on a remote host except SSH?
telnet
rlogin
both telnet and rlogin
none of the mentioned
41. Which one of the following is a file transfer protocol using SSH?
SCP
SFTP
Rsync
all of the mentioned
42. SSH-2 does not contain ________
transport layer
user authentication layer
physical layer
connection layer
43. Which one of the following feature was present in SSH protocol, version 1?
password changing
periodic replacement of session keys
support for public-key certificates
none of the mentioned
44. SCP protocol is evolved from __________ over SSH.
RCP protocol
DHCP protocol
MGCP protocol
GCP protocol
45. Which one of the following authentication method is used by SSH?
public-key
host based
password
all of the mentioned
46. DHCP (dynamic host configuration protocol) provides __________ to the client.
IP address
MAC address
Url
none of the mentioned
47. DHCP is used for ______
IPv6
IPv4
Both IPv6 and IPv4
none of the mentioned
48. The DHCP server _______
maintains a database of available IP addresses
maintains the information about client configuration parameters
grants a IP address when receives a request from a client
all of the mentioned
49. IP assigned for a client by DHCP server is
for a limited period
for an unlimited period
not time dependent
None of the mentioned
50. DHCP uses UDP port _________ for sending data to the server.
66
67
68
69
Submit