MCQs in Remote Logging, Electronic Mail, and File Transfer

MCQs in Remote Logging, Electronic Mail, and File Transfer from the book Data Communications and Networking 4th Edition by Behrouz A. Forouzan. Reviewer in Electronics Systems and Technologies (Communications Engineering).

MCQs for Remote Logging, Electronic Mail, and File Transfer

This is the MCQs in Remote Logging, Electronic Mail, and File Transfer from book the Data Communications and Networking 4th Edition by Behrouz A. Forouzan. If you are looking for a reviewer in Electronics Systems and Technologies (Communications Engineering) this will definitely help you before taking the Board Exam.

Topic Outline

  • REMOTE LOGGING
  • TELNET 
  • ELECTRONIC MAIL
    • Architecture
    • User Agent
    • Message Transfer Agent: SMTP
    • Message Access Agent: POP and IMAP
    • Web-Based Mail
  • FILE TRANSFER
    • File Transfer Protocol (FTP)
    • Anonymous FTP

Begin and Good luck!

Choose the letter of the best answer in each questions.

1. When both sender and receiver are connected to a mail server via a LAN or a WAN, we need ___________________.

  • A)            two UAs, two pairs of MTAs, and a pair of MAAs
  • B)            two UAs, and two pairs of MTAs
  • C)            two UAs, two pairs of MTAs, and two pairs of MAAs
  • D)            none of the above

2. The actual mail transfer is done through ____________.

  • A)            UAs
  • B)            MTAs
  • C)            MAAs
  • D)            none of the above

3. If the sender wants an option enabled by the receiver, it sends a _______ command.

  • A)            WILL
  • B)            DO
  • C)            WONT
  • D)            none of the above

4. When the sender is connected to the mail server via a LAN or a WAN, we need ______________.

  • A)            two MTA
  • B)            two UAs and two pairs of MTAs
  • C)            two UAs and a pair of MTAs
  • D)            none of the above

5. The ________ usually contains the sender address, the receiver address, and other information.

  • A)            message
  • B)            envelope
  • C)            both a and b
  • D)            none of the above

6. NVT uses two sets of characters, one for _____and one for __________.

  • A)            sending; receiving
  • B)            request; reply
  • C)            data; control
  • D)            none of the above

7. In FTP, ASCII, EBCDIC, and image define an attribute called _______.

  • A)            file type
  • B)            data structure
  • C)            transmission mode
  • D)            none of the above

8. The third stage in an email transfer needs a ________ protocol.

  • A)            pull
  • B)            push
  • C)            both a and b
  • D)            none of the above

9. _______ is the standard mechanism provided by TCP/IP for copying a file from one host to another.

  • A)            TELNET
  • B)            SMTP
  • C)            TFTP
  • D)           none of the above

10. In the _______ mode, each character typed is sent by the client to the server.

  • A)            default
  • B)            character
  • C)            line
  • D)            none of the above

11. The _______ is software residing on the remote system that allows the remote system to receive characters from a TELNET server.

  • A)             terminal driver
  • B)             pseudoterminal driver
  • C)             TELNET client
  • D)             none of the above

12. FTP uses the services of ________.

  • A)             UDP
  • B)             IP
  • C)             TCP
  • D)             none of the above

13. For the control connection, FTP uses the __________ character set.

  • A)             regular ASCII
  • B)             EBCDIC
  • C)             NVT ASCII
  • D)             none of the above

14. In FTP, when we _______, it is copied from the client to the server.

  • A)             retrieve a file
  • B)             store a file
  • C)             retrieve a list
  • D)             none of the above

15. During an FTP session the data connection is opened _______.

  • A)             exactly once
  • B)             exactly twice
  • C)             as many times as necessary
  • D)             none of the above

16. In FTP, _______ is the service type used by the IP protocol because this is an interactive connection between a user (human) and a server.

  • A)             maximize throughput
  • B)             minimize delay
  • C)             minimize error
  • D)             none of the above

17. When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login.

  • A)             local
  • B)             remote
  • C)             temporary
  • D)             none of the above

18. The third stage in an email transfer uses a(n) ________ protocol.

  • A)             UA
  • B)             MTA
  • C)             MAA
  • D)             none of the above

19. TELNET uses only one TCP connection. The server uses ________ port and the client uses ________ port.

  • A)             a well-known; another well-known
  • B)             an ephemeral; another ephemeral
  • C)             a well-known; an ephemeral
  • D)             none of the above

20. For control, NVT uses US ASCII characters with the highest order bit set to ______.

  • A)             1
  • B)             0
  • C)             a or b
  • D)             none of the above

21. The formal protocol that defines the MTA client and server in the Internet is called ___________.

  • A)             SMTP
  • B)             SNMP
  • C)             TELNET
  • D)             none of the above

22. _________ is a supplementary protocol that allows non-ASCII data to be sent through email.

  • A)             JPEG
  • B)             MPEG
  • C)             MIME
  • D)             none of the above

23. Which of the following services is not provided by a UA?

  • A)             composing messages
  • B)             reading messages
  • C)             replying messages
  • D)             all are

24. If the sender wants to enable an option, it sends a _______ command.

  • A)             WILL
  • B)             DO
  • C)             WONT
  • D)             none of the above

25. In FTP, when we _______, it is copied from the server to the client.

  • A)             retrieve a file
  • B)             retrieve a list
  • C)             a and b
  • D)             none of the above

26. TELNET is an abbreviation for ____________.

  • A)             terminal network
  • B)             telephone network
  • C)             telecommunication network
  • D)             none of the above

27. When a user logs into a local time-sharing system, it is called ________ login.

  • A)             local
  • B)             remote
  • C)             temporary
  • D)             none of the above

28. Which part of the mail created by the UA contains the sender and receiver names?

  • A)             envelope
  • B)             address
  • C)             header
  • D)             none of the above

29. ________ is part of a local hard drive, a special file with permission restrictions.

  • A)             A message
  • B)             A response
  • C)             An agent
  • D)             none of the above

30. ________ provides service to the user to make the process of sending and receiving a message easier.

  • A)             An MTA
  • B)             An MAA
  • C)             A UA
  • D)             none of the above

31. The message contains the ________ and the __________.

  • A)             header; envelop
  • B)             header; body
  • C)             envelop; body
  • D)             none of the above

32. In the ____ mode, line editing (echoing, character erasing, line erasing, and so on) is done by the client.

  • A)             default
  • B)             character
  • C)             line
  • D)             none of the above

33. The MIME _______ header uses text to describe the type of data in the body of the message.

  • A)             content-type
  • B)             content-transfer-encoding
  • C)             content-description
  • D)             none of the above

34. If the sender wants to disable an option, it sends a _______ command.

  • A)             WILL
  • B)             DO
  • C)             WONT
  • D)             none of the above

35. SMTP is a __________protocol.

  • A)             pull
  • B)             push
  • C)             both a and b
  • D)             none of the above

36. In FTP, there are three types of _______: stream, block, and compressed.

  • A)             file types
  • B)             data structures
  • C)             transmission modes
  • D)             none of the above

37. For data, NVT uses US ASCII characters with the highest order bit set to ______.

  • A)             1
  • B)             0
  • C)             a or b
  • D)             none of the above

38. The _______ translates NVT characters into a form acceptable by the remote operating system.

  • A)             terminal driver
  • B)             TELNET client
  • C)             TELNET server
  • D)             none of the above

39. When the sender and the receiver of an email are on the same system, we need only ___________.

  • A)             one UA
  • B)             two UAs
  • C)             one UA and one MTA
  • D)             none of the above

40. In the Internet, the email address consists of two parts: a _______ and a _______.

  • A)             local part; domain name
  • B)             global part; domain name
  • C)             label; domain name
  • D)             none of the above

41. To distinguish data from control characters, each sequence of control characters is preceded by a special control character called ________.

  • A)             ICA
  • B)             IAC
  • C)            AIC
  • D)             none of the above

42. When the sender and the receiver of an email are on different systems, we need only _____________.

  • A)             one MTA
  • B)             two UAs
  • C)             two UAs and one pair of MTAs
  • D)             none of the above

43. During an FTP session the control connection is opened _______.

  • A)             exactly once
  • B)             exactly twice
  • C)             as many times as necessary
  • D)             none of the above

44. If the sender wants an option disabled by the receiver, it sends a _______ command.

  • A)             WILL
  • B)             DO
  • C)             DONT
  • D)             none of the above

45. The _______ translates local characters into NVT form.

  • A)             terminal driver
  • B)             TELNET client
  • C)             TELNET server
  • D)             none of the above

46. Currently two message access protocols are available: _______ and _________.

  • A)             POP3; IMAP2
  • B)             POP4; IMAP1
  • C)             POP3; IMAP4
  • D)             none of the above

47. TELNET is a ________ client-server application program.

  • A)             specific-purpose
  • B)             general-purpose
  • C)             both a and b
  • D)             none of the above

48. In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _______.

  • A)             file types
  • B)             data structures
  • C)             transmission modes
  • D)             none of the above

49. The process of transferring a mail message occurs in ________ phases.

  • A)             two
  • B)             four
  • C)             five
  • D)             none of the above

50. In FTP, the well-known port ____ is used for the control connection and the well-known port ________ for the data connection.

  • A)             21; 22
  • B)             21; 20
  • C)             20; 21
  • D)             none of the above

51. In the _______ mode, the echoing is done by the client.

  • A)             default
  • B)             character
  • C)             line
  • D)             none of the above

52. There are two types of user agents: _________ and ___________.

  • A)             command-driven; data-driven
  • B)             command-driven; GUI-based
  • C)             command-based and data-based
  • D)             none of the above

53. _______ is more powerful and complex than _______.

  • A)             POP3; IMAP4
  • B)             IMAP4; POP3
  • C)             SMTP; POP3
  • D)             none of the above

Check your work.

Complete List of Chapter Quiz in Data Communications and Networking

Download File in PDF


credit: Behrouz A. Forouzan© 2014 www.PinoyBIX.org

Search! Type it and Hit Enter


We educate thousands of students a week in preparation for their licensure examinations. We provide professionals with materials for their lectures and practice exams. To help us go forward with the same spirit, contribution from your side will highly appreciated. Thank you in advance.


Labels:

Post a Comment

Contact Form

Name

Email *

Message *

Powered by Blogger.
Javascript DisablePlease Enable Javascript To See All Widget
Real Time Web Analytics