Explore topic-wise MCQs in Technical Programming.

This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.

501.

Which one of the following protocol can be used for login to a shell on a remote host except SSH?

A. telnet
B. rlogin
C. both telnet and rlogin
D. none of the mentioned
Answer» D. none of the mentioned
502.

Which standard TCP port is assigned for contacting SSH servers?

A. port 21
B. port 22
C. port 23
D. port 24
Answer» C. port 23
503.

SSH uses ___________ to authenticate the remote computer.

A. public-key cryptography
B. private-key cryptography
C. any of public-key or private-key
D. none of the mentioned
Answer» B. private-key cryptography
504.

SSH can be used in only

A. unix-like operating systems
B. windows
C. both unix-like and windows systems
D. none of the mentioned
Answer» D. none of the mentioned
505.

Secure shell (SSH) network protocol is used for

A. secure data communication
B. remote command-line login
C. remote command execution
D. all of the mentioned
Answer» E.
506.

The domain name system is maintained by

A. distributed database system
B. a single server
C. a single computer
D. none of the mentioned
Answer» B. a single server
507.

The right to use a domain name is delegated by domain name registers which are accredited by

A. internet architecture board
B. internet society
C. internet research task force
D. internet corporation for assigned names and numbers
Answer» E.
508.

Wildcard domain names start with label

A. @
B. *
C. &
D. #
Answer» C. &
509.

Which one of the following allows client to update their DNS entry as their IP address change?

A. dynamic DNS
B. mail transfer agent
C. authoritative name server
D. none of the mentioned
Answer» B. mail transfer agent
510.

If a server has no clue about where to find the address for a hostname then

A. server asks to the root server
B. server asks to its adjcent server
C. request is not processed
D. none of the mentioned
Answer» B. server asks to its adjcent server
511.

DNS database contains

A. name server records
B. hostname-to-address records
C. hostname aliases
D. all of the mentioned
Answer» E.
512.

Servers handle requests for other domains

A. directly
B. by contacting remote DNS server
C. it is not possible
D. none of the mentioned
Answer» C. it is not possible
513.

A DNS client is called

A. DNS updater
B. DNS resolver
C. DNS handler
D. none of the mentioned
Answer» C. DNS handler
514.

The entire hostname has a maximum of

A. 255 characters
B. 127 characters
C. 63 characters
D. 31 characters
Answer» B. 127 characters
515.

SMTP is used to deliver messages to

A. user’s terminal
B. user’s mailbox
C. both user’s terminal and mailbox
D. none of the mentioned
Answer» D. none of the mentioned
516.

Which one of the following is an SMTP server configured in such a way that anyone on the internet can send e-mail through it?

A. open mail relay
B. wide mail reception
C. open mail reception
D. none of the mentioned
Answer» B. wide mail reception
517.

SMTP defines

A. message transport
B. message encryption
C. message content
D. none of the mentioned
Answer» B. message encryption
518.

A SMTP session may include

A. zero SMTP transaction
B. one SMTP transaction
C. more than one SMTP transaction
D. all of the mentioned
Answer» E.
519.

An email client needs to know the _________ of its initial SMTP server.

A. IP address
B. MAC address
C. Url
D. None of the mentioned
Answer» B. MAC address
520.

What is on-demand mail relay (ODMR)?

A. protocol for SMTP security
B. an SMTP extension
C. protocol for web pages
D. none of the mentioned
Answer» C. protocol for web pages
521.

Which one of the following protocol is used to receive mail messages?

A. smtp
B. post office protocol
C. internet message access protocol
D. all of the mentioned
Answer» E.
522.

SMTP uses the TCP port

A. 22
B. 23
C. 24
D. 25
Answer» E.
523.

SMTP connections secured by SSL are known as

A. SMTPS
B. SSMTP
C. SNMP
D. None of the mentioned
Answer» B. SSMTP
524.

Simple mail transfer protocol (SMTP) utilizes _________ as the transport layer protocol for electronic mail transfer.

A. TCP
B. UDP
C. DCCP
D. SCTP
Answer» B. UDP
525.

User agent does not support this

A. Composing messages
B. Reading messages
C. Replying messages
D. All of the mentioned
Answer» E.
526.

When the sender and the receiver of an email are on different systems, we need only _________

A. One MTA
B. Two UAs
C. Two UAs and one pair of MTAs
D. Two UAs and two pairs of MTAs
Answer» E.
527.

Example of user agents for e-mail

A. Microsoft Outlook
B. Apple Mail
C. None of the above
D. All of the mentioned
Answer» B. Apple Mail
528.

A session may include

A. Zero or more SMTP transactions
B. Exactly one SMTP transactions
C. Always more than one SMTP transactions
D. Number of SMTP transactions cant be determined
Answer» B. Exactly one SMTP transactions
529.

Typically the TCP port used by SMTP is

A. 25
B. 35
C. 50
D. 15
Answer» B. 35
530.

Internet mail places each object in

A. Separate messages for each object
B. One message
C. Varies with number of objects
D. None of the mentioned
Answer» C. Varies with number of objects
531.

Choose the statement which is wrong incase of SMTP

A. It requires message to be in 7bit ASCII format
B. It is a pull protocol
C. It transfers files from one mail server to another mail server
D. None of the mentioned
Answer» C. It transfers files from one mail server to another mail server
532.

The underlying Transport layer protocol used by SMTP is

A. TCP
B. UDP
C. Either TCP or UDP
D. None of the mentioned
Answer» B. UDP
533.

In SMTP, the command to write recievers mail adress is written with this command

A. SEND TO
B. RCPT TO
C. MAIL TO
D. None of the mentioned
Answer» C. MAIL TO
534.

Expansion of SMTP is

A. Simple Mail Transfer Protocol
B. Simple Message Transfer Protocol
C. Simple Mail Transmission Protocol
D. Simple Message Transmission Protocol
Answer» B. Simple Message Transfer Protocol
535.

If you have to send multimedia data over SMTP it has to be encoded into

A. Binary
B. Signal
C. ASCII
D. None of the mentioned
Answer» D. None of the mentioned
536.

When the mail server sends mail to other mail servers it becomes ____________

A. SMTP server
B. SMTP client
C. Peer
D. None of the mentioned
Answer» C. Peer
537.

The password is sent to the server using ________ command

A. PASSWD
B. PASS
C. PASSWORD
D. None of the mentioned
Answer» C. PASSWORD
538.

Mode of data transfer in FTP, where all the is left to TCP

A. Stream mode
B. Block mode
C. Compressed mode
D. None of the mentioned
Answer» B. Block mode
539.

Find the FTP reply whose message is wrongly matched

A. 331 – Username OK, password required
B. 425 – Can’t open data connection
C. 452 – Error writing file
D. 452 – Can’t open data connection
Answer» E.
540.

The commands, from client to server, and replies, from server to client, are sent across the control connection in ________ bit ASCII format

A. 8
B. 7
C. 3
D. 5
Answer» C. 3
541.

FTP server

A. Mantains state
B. Is stateless
C. Has single TCP connection for a file transfer
D. None of the mentioned
Answer» B. Is stateless
542.

If 5 files are transfered from server A to client B in the same session. The number of TCP connection between A and B is

A. 5
B. 10
C. 2
D. 6
Answer» E.
543.

Identify the incorrect statement

A. FTP stands for File Transfer Protocol
B. FTP uses two parallel TCP connections
C. FTP sends its control information in-band
D. FTP sends exactly one file over the data connection
Answer» D. FTP sends exactly one file over the data connection
544.

FTP uses _________ parallel TCP connections to transfer a file

A. 1
B. 2
C. 3
D. 4
Answer» C. 3
545.

FTP is built on _____ architecture

A. Client-server
B. P2P
C. Both of the mentioned
D. None of the mentioned
Answer» B. P2P
546.

Expansion of FTP is

A. Fine Transfer Protocol
B. File Transfer Protocol
C. First Transfer Protocol
D. None of the mentioned
Answer» C. First Transfer Protocol
547.

In file transfer protocol, data transfer can be done in

A. stream mode
B. block mode
C. compressed mode
D. all of the mentioned
Answer» E.
548.

The file transfer protocol is built on

A. data centric architecture
B. service oriented architecture
C. client server architecture
D. none of the mentioned
Answer» D. none of the mentioned
549.

In which mode FTP, the client initiates both the control and data connections.

A. active mode
B. passive mode
C. both active mode and passive mode
D. none of the mentioned
Answer» C. both active mode and passive mode
550.

In FTP protocol, client contacts server using ____ as the transport protocol.

A. transmission control protocol
B. user datagram protocol
C. datagram congestion control protocol
D. stream control transmission protocol
Answer» B. user datagram protocol