Explore topic-wise MCQs in Electrical Engineering.

This section includes 479 Mcqs, each offering curated multiple-choice questions to sharpen your Electrical Engineering knowledge and support exam preparation. Choose a topic below to get started.

351.

DNS database contains _______

A. name server records
B. hostname-to-address records
C. hostname aliases
D. all of the mentioned
Answer» E.
352.

Servers handle requests for other domains _______

A. directly
B. by contacting remote dns server
C. it is not possible
D. none of the mentioned
Answer» C. it is not possible
353.

A DNS client is called _________

A. dns updater
B. dns resolver
C. dns handler
D. none of the mentioned
Answer» C. dns handler
354.

The entire hostname has a maximum of ___________

A. 255 characters
B. 127 characters
C. 63 characters
D. 31 characters
Answer» B. 127 characters
355.

SMTP is not used to deliver messages to ______

A. user’s terminal
B. user’s mailbox
C. user’s word processor
D. user’s email client
Answer» D. user’s email client
356.

SMTP defines _______

A. message transport
B. message encryption
C. message content
D. message password
Answer» B. message encryption
357.

An SMTP session may not include _______

A. zero smtp transaction
B. one smtp transaction
C. more than one smtp transaction
D. one http transaction
Answer» E.
358.

An email client needs to know the _________ of its initial SMTP server.

A. ip address
B. mac address
C. url
D. name
Answer» B. mac address
359.

What is on-demand mail relay (ODMR)?

A. protocol for smtp security
B. an smtp extension
C. protocol for web pages
D. protocol for faster mail transfer
Answer» C. protocol for web pages
360.

Which one of the following protocol is used to receive mail messages?

A. smtp
B. post office protocol (pop)
C. internet message access protocol (imap)
D. ftp
Answer» E.
361.

SMTP uses which of the following TCP port?

A. 22
B. 23
C. 21
D. 25
Answer» E.
362.

SMTP connections secured by SSL are known as _____________

A. smtps
B. ssmtp
C. snmp
D. starttls
Answer» B. ssmtp
363.

User agent does not support this ___________

A. composing messages
B. reading messages
C. replying messages
D. routing messages
Answer» E.
364.

Which of the following is an example of user agents for e-mail?

A. microsoft outlook
B. facebook
C. google
D. tumblr
Answer» B. facebook
365.

A session may include ________

A. zero or more smtp transactions
B. exactly one smtp transactions
C. always more than one smtp transactions
D. number of smtp transactions cant be determined
Answer» B. exactly one smtp transactions
366.

Internet mail places each object in _________

A. separate messages for each object
B. one message
C. varies with number of objects
D. multiple messages for each object
Answer» C. varies with number of objects
367.

Typically the TCP port used by SMTP is _________

A. 25
B. 35
C. 50
D. 15
Answer» B. 35
368.

Choose the statement which is wrong incase of SMTP?

A. it requires message to be in 7bit ascii format
B. it is a pull protocol
C. it transfers files from one mail server to another mail server
D. smtp is responsible for the transmission of the mail through the internet
Answer» C. it transfers files from one mail server to another mail server
369.

If you have to send multimedia data over SMTP it has to be encoded into _______

A. binary
B. signal
C. ascii
D. hash
Answer» D. hash
370.

The underlying Transport layer protocol used by SMTP is ________

A. tcp
B. udp
C. either tcp or udp
D. imap
Answer» B. udp
371.

When the mail server sends mail to other mail servers it becomes ____________

A. smtp server
B. smtp client
C. peer
D. master
Answer» C. peer
372.

The password is sent to the server using ________ command

A. passwd
B. pass
C. password
D. pword
Answer» C. password
373.

FTP server _____________

A. maintains state information
B. is stateless
C. has single tcp connection for a file transfer
D. has udp connection for file transfer
Answer» B. is stateless
374.

Identify the incorrect statement regarding FTP.

A. ftp stands for file transfer protocol
B. ftp uses two parallel tcp connections
C. ftp sends its control information in-band
D. ftp sends exactly one file over the data connection
Answer» D. ftp sends exactly one file over the data connection
375.

FTP uses _________ parallel TCP connections to transfer a file.

A. 1
B. 2
C. 3
D. 4
Answer» C. 3
376.

Find the FTP reply whose message is wrongly matched.

A. 331 – username ok, password required
B. 425 – can’t open data connection
C. 452 – error writing file
D. 452 – can’t open data connection
Answer» E.
377.

FTP is built on _____ architecture.

A. client-server
B. p2p
C. data centric
D. service oriented
Answer» B. p2p
378.

Expansion of FTP is __________

A. fine transfer protocol
B. file transfer protocol
C. first transfer protocol
D. fast transfer protocol
Answer» C. first transfer protocol
379.

In File Transfer Protocol, data transfer cannot be done in ___________

A. stream mode
B. block mode
C. compressed mode
D. message mode
Answer» E.
380.

The File Transfer Protocol is built on ______________

A. data centric architecture
B. service oriented architecture
C. client server architecture
D. connection oriented architecture
Answer» D. connection oriented architecture
381.

FTP server listens for connection on port number ____________

A. 20
B. 21
C. 22
D. 23
Answer» C. 22
382.

The __________ method when used in the method field, leaves entity body empty.

A. post
B. send
C. get
D. put
Answer» D. put
383.

Which of the following is not correct?

A. web cache doesnt has its own disk space
B. web cache can act both like server and client
C. web cache might reduce the response time
D. web cache contains copies of recently requested objects
Answer» B. web cache can act both like server and client
384.

The first line of HTTP request message is called _____________

A. request line
B. header line
C. status line
D. entity line
Answer» B. header line
385.

The HTTP request message is sent in _________ part of three-way handshake.

A. first
B. second
C. third
D. fourth
Answer» D. fourth
386.

When displaying a web page, the application layer uses the _____________

A. http protocol
B. ftp protocol
C. smtp protocol
D. tcp protocol
Answer» B. ftp protocol
387.

Application layer protocol defines ____________

A. types of messages exchanged
B. message format, syntax and semantics
C. rules for when and how processes send and respond to messages
D. all of the mentioned
Answer» E.
388.

The ____________ translates internet domain and host names to IP address.

A. domain name system
B. routing information protocol
C. network time protocol
D. internet relay chat
Answer» B. routing information protocol
389.

Electronic mail uses which Application layer protocol?

A. smtp
B. http
C. ftp
D. sip
Answer» B. http
390.

Transport services available to applications in one or another form _________

A. reliable data transfer
B. timing
C. security
D. all of the mentioned
Answer» E.
391.

Which is a time-sensitive service?

A. file transfer
B. file download
C. e-mail
D. internet telephony
Answer» E.
392.

Pick the odd one out.

A. file transfer
B. file download
C. e-mail
D. interactive games
Answer» E.
393.

Which of the following is an application layer service?

A. network virtual terminal
B. file transfer, access, and management
C. mail service
D. all of the mentioned
Answer» E.
394.

E-mail is _________

A. loss-tolerant application
B. bandwidth-sensitive application
C. elastic application
D. none of the mentioned
Answer» D. none of the mentioned
395.

Application layer offers _______ service.

A. end to end
B. process to process
C. both end to end and process to process
D. none of the mentioned
Answer» B. process to process
396.

Which one of the following is an architecture paradigms?

A. peer to peer
B. client-server
C. http
D. both peer-to-peer & client-server
Answer» E.
397.

Which is not a application layer protocol?

A. http
B. smtp
C. ftp
D. tcp
Answer» E.
398.

Which of the following is not an application layer service?

A. network virtual terminal
B. file transfer, access, and management
C. mail service
D. error control
Answer» E.
399.

In _________ systems, resources are allocated on demand.

A. packet switching
B. circuit switching
C. line switching
D. frequency switching
Answer» B. circuit switching
400.

What are the Methods to move data through a network of links and switches?

A. packet switching and line switching
B. circuit switching and line switching
C. line switching and bit switching
D. packet switching and circuit switching
Answer» E.