Computer Networks MCQ Number 01562

Computer Networks MCQ Set 1

1. Simple mail transfer protocol (SMTP) utilizes _________ as the transport layer protocol for electronic mail transfer.
a) TCP
b) UDP
c) DCCP
d) SCTP

Answer

Answer:a [Reason:]None.

2. SMTP connections secured by SSL are known as
a) SMTPS
b) SSMTP
c) SNMP
d) None of the mentioned

Answer

Answer:a [Reason:]None.

3. SMTP uses the TCP port
a) 22
b) 23
c) 24
d) 25

Answer

Answer:d [Reason:]None.

4. Which one of the following protocol is used to receive mail messages?
a) smtp
b) post office protocol
c) internet message access protocol
d) all of the mentioned

Answer

Answer:d [Reason:]None.

5. What is on-demand mail relay (ODMR)?
a) protocol for SMTP security
b) an SMTP extension
c) protocol for web pages
d) none of the mentioned

Answer

Answer:b [Reason:]None.

6. An email client needs to know the _________ of its initial SMTP server.
a) IP address
b) MAC address
c) Url
d) None of the mentioned

Answer

Answer:a [Reason:]None.

7. A SMTP session may include
a) zero SMTP transaction
b) one SMTP transaction
c) more than one SMTP transaction
d) all of the mentioned

Answer

Answer:d [Reason:]None.

8. SMTP defines
a) message transport
b) message encryption
c) message content
d) none of the mentioned

Answer

Answer:a [Reason:]None.

9. Which one of the following is an SMTP server configured in such a way that anyone on the internet can send e-mail through it?
a) open mail relay
b) wide mail reception
c) open mail reception
d) none of the mentioned

Answer

Answer:a [Reason:]None.

10. SMTP is used to deliver messages to
a) user’s terminal
b) user’s mailbox
c) both user’s terminal and mailbox
d) none of the mentioned

Answer

Answer:c [Reason:]None.

Computer Networks MCQ Set 2

1. Secure shell (SSH) network protocol is used for
a) secure data communication
b) remote command-line login
c) remote command execution
d) all of the mentioned

Answer

Answer:d [Reason:] None.

2. SSH can be used in only
a) unix-like operating systems
b) windows
c) both unix-like and windows systems
d) none of the mentioned

Answer

Answer:c [Reason:] None.

3. SSH uses ___________ to authenticate the remote computer.
a) public-key cryptography
b) private-key cryptography
c) any of public-key or private-key
d) none of the mentioned

Answer

Answer:a [Reason:] None.

4. Which standard TCP port is assigned for contacting SSH servers?
a) port 21
b) port 22
c) port 23
d) port 24

Answer

Answer:b [Reason:] None.

5. Which one of the following protocol can be used for login to a shell on a remote host except SSH?
a) telnet
b) rlogin
c) both telnet and rlogin
d) none of the mentioned

Answer

Answer:c [Reason:] SSH is more secured then telnet and rlogin.

6. Which one of the following is a file transfer protocol using SSH?
a) SCP
b) SFTP
c) Rsync
d) All of the mentioned

Answer

Answer:d [Reason:] None.

7. SSH-2 does not contain
a) transport layer
b) user authentication layer
c) physical layer
d) connection layer

Answer

Answer:c [Reason:] None.

8. Which one of the following feature was present in SSH protocol, version 1?
a) password changing
b) periodic replacement of session keys
c) support for public-key certificates
d) none of the mentioned

Answer

Answer:d [Reason:] None.

9. SCP protocol is evolved from __________ over SSH.
a) RCP protocol
b) DHCP protocol
c) MGCP protocol
d) none of the mentioned

Answer

Answer:a [Reason:] None.

10. Which one of the following authentication method is used by SSH?
a) public-key
b) host based
c) password
d) all of the mentioned

Answer

Answer:d [Reason:] None.

Computer Networks MCQ Set 3

1. Telnet protocol is used to establish a connection to
a) TCP port number 21
b) TCP port number 22
c) TCP port number 23
d) TCP port number 24

Answer

Answer: c [Reason:] None.

2. Which one of the following is not true?
a) telnet defines a network virtual terminal (NVT) standard
b) client programs interact with NVT
c) server translates NVT operations
d) none of the mentioned

Answer

Answer: d [Reason:] None.

3. All telnet operations are sent as
a) 4 bytes
b) 8 bytes
c) 16 bytes
d) 32 bytes

Answer

Answer: b [Reason:] None.

4. AbsoluteTelnet is a telnet client for
a) windows
b) linux
c) mac
d) none of the mentioned

Answer

Answer: a [Reason:] None.

5. The decimal code of interpret as command (IAC) character is
a) 252
b) 253
c) 254
d) 255

Answer

Answer: d [Reason:] None.

6. In character mode operation of telnet implementation
a) each character typed is sent by the client to the server
b) each character typed is discarded by the server
c) each character typed is aggregated into a word and then send to the server
d) none of the mentioned

Answer

Answer: a [Reason:] None.

7. In telnet, the client echoes the character on the screen but does not send it until a whole line is completed in
a) default mode
c) character mode
c) server mode
d) none of the mentioned

Answer

Answer: a [Reason:] None.

8. Which one of the following is not correct?
a) telnet is a general purpose client-server program
b) telnet lets user access an application on a remote computer
c) telnet can also be used for file transfer
d) none of the mentioned

Answer

Answer: c [Reason:] None.

Computer Networks MCQ Set 4

1. Transport layer aggregates data from different applications into a single stream before passing it to
a) network layer
b) data link layer
c) application layer
d) physical layer

Answer

Answer: a [Reason:] None.

2. Which one of the following is a transport layer protocol used in networking?
a) TCP
b) UDP
c) Both TCP and UDP
d) None of the mentioned

Answer

Answer: c [Reason:] None.

3. User datagram protocol is called connectionless because
a) all UDP packets are treated independently by transport layer
b) it sends data as a stream of related packets
c) it is received in the same order as sent order
d) none of the mentioned

Answer

Answer: a [Reason:] None.

4. Transmission control protocol is
a) connection oriented protocol
b) uses a three way handshake to establish a connection
c) recievs data from application as a single stream
d) all of the mentioned

Answer

Answer: d [Reason:] None.

5. An endpoint of an inter-process communication flow across a computer network is called
a) socket
b) pipe
c) port
d) none of the mentioned

Answer

Answer: a [Reason:] None.

6. Socket-style API for windows is called
a) wsock
b) winsock
c) wins
d) none of the mentioned

Answer

Answer: b [Reason:] None.

7. Which one of the following is a version of UDP with congestion control?
a) datagram congestion control protocol
b) stream control transmission protocol
c) structured stream transport
d) none of the mentioned

Answer

Answer: a [Reason:] None.

8. A _____ is a TCP name for a transport service access point.
a) port
b) pipe
c) node
d) none of the mentioned

Answer

Answer: a [Reason:] None.

9. Transport layer protocols deals with
a) application to application communication
b) process to process communication
c) node to node communication
d) none of the mentioned

Answer

Answer: b [Reason:] None.

10. Which one of the following is a transport layer protocol?
a) stream control transmission protocol
b) internet control message protocol
c) neighbor discovery protocol
d) dynamic host configuration protocol

Answer

Answer: a [Reason:] None.

ed010d383e1f191bdb025d5985cc03fc?s=120&d=mm&r=g

DistPub Team

Distance Publisher (DistPub.com) provide project writing help from year 2007 and provide writing and editing help to hundreds student every year.