

MCQOPTIONS
Saved Bookmarks
This section includes 479 Mcqs, each offering curated multiple-choice questions to sharpen your Electrical Engineering knowledge and support exam preparation. Choose a topic below to get started.
351. |
DNS database contains _______ |
A. | name server records |
B. | hostname-to-address records |
C. | hostname aliases |
D. | all of the mentioned |
Answer» E. | |
352. |
Servers handle requests for other domains _______ |
A. | directly |
B. | by contacting remote dns server |
C. | it is not possible |
D. | none of the mentioned |
Answer» C. it is not possible | |
353. |
A DNS client is called _________ |
A. | dns updater |
B. | dns resolver |
C. | dns handler |
D. | none of the mentioned |
Answer» C. dns handler | |
354. |
The entire hostname has a maximum of ___________ |
A. | 255 characters |
B. | 127 characters |
C. | 63 characters |
D. | 31 characters |
Answer» B. 127 characters | |
355. |
SMTP is not used to deliver messages to ______ |
A. | user’s terminal |
B. | user’s mailbox |
C. | user’s word processor |
D. | user’s email client |
Answer» D. user’s email client | |
356. |
SMTP defines _______ |
A. | message transport |
B. | message encryption |
C. | message content |
D. | message password |
Answer» B. message encryption | |
357. |
An SMTP session may not include _______ |
A. | zero smtp transaction |
B. | one smtp transaction |
C. | more than one smtp transaction |
D. | one http transaction |
Answer» E. | |
358. |
An email client needs to know the _________ of its initial SMTP server. |
A. | ip address |
B. | mac address |
C. | url |
D. | name |
Answer» B. mac address | |
359. |
What is on-demand mail relay (ODMR)? |
A. | protocol for smtp security |
B. | an smtp extension |
C. | protocol for web pages |
D. | protocol for faster mail transfer |
Answer» C. protocol for web pages | |
360. |
Which one of the following protocol is used to receive mail messages? |
A. | smtp |
B. | post office protocol (pop) |
C. | internet message access protocol (imap) |
D. | ftp |
Answer» E. | |
361. |
SMTP uses which of the following TCP port? |
A. | 22 |
B. | 23 |
C. | 21 |
D. | 25 |
Answer» E. | |
362. |
SMTP connections secured by SSL are known as _____________ |
A. | smtps |
B. | ssmtp |
C. | snmp |
D. | starttls |
Answer» B. ssmtp | |
363. |
User agent does not support this ___________ |
A. | composing messages |
B. | reading messages |
C. | replying messages |
D. | routing messages |
Answer» E. | |
364. |
Which of the following is an example of user agents for e-mail? |
A. | microsoft outlook |
B. | |
C. | |
D. | tumblr |
Answer» B. facebook | |
365. |
A session may include ________ |
A. | zero or more smtp transactions |
B. | exactly one smtp transactions |
C. | always more than one smtp transactions |
D. | number of smtp transactions cant be determined |
Answer» B. exactly one smtp transactions | |
366. |
Internet mail places each object in _________ |
A. | separate messages for each object |
B. | one message |
C. | varies with number of objects |
D. | multiple messages for each object |
Answer» C. varies with number of objects | |
367. |
Typically the TCP port used by SMTP is _________ |
A. | 25 |
B. | 35 |
C. | 50 |
D. | 15 |
Answer» B. 35 | |
368. |
Choose the statement which is wrong incase of SMTP? |
A. | it requires message to be in 7bit ascii format |
B. | it is a pull protocol |
C. | it transfers files from one mail server to another mail server |
D. | smtp is responsible for the transmission of the mail through the internet |
Answer» C. it transfers files from one mail server to another mail server | |
369. |
If you have to send multimedia data over SMTP it has to be encoded into _______ |
A. | binary |
B. | signal |
C. | ascii |
D. | hash |
Answer» D. hash | |
370. |
The underlying Transport layer protocol used by SMTP is ________ |
A. | tcp |
B. | udp |
C. | either tcp or udp |
D. | imap |
Answer» B. udp | |
371. |
When the mail server sends mail to other mail servers it becomes ____________ |
A. | smtp server |
B. | smtp client |
C. | peer |
D. | master |
Answer» C. peer | |
372. |
The password is sent to the server using ________ command |
A. | passwd |
B. | pass |
C. | password |
D. | pword |
Answer» C. password | |
373. |
FTP server _____________ |
A. | maintains state information |
B. | is stateless |
C. | has single tcp connection for a file transfer |
D. | has udp connection for file transfer |
Answer» B. is stateless | |
374. |
Identify the incorrect statement regarding FTP. |
A. | ftp stands for file transfer protocol |
B. | ftp uses two parallel tcp connections |
C. | ftp sends its control information in-band |
D. | ftp sends exactly one file over the data connection |
Answer» D. ftp sends exactly one file over the data connection | |
375. |
FTP uses _________ parallel TCP connections to transfer a file. |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» C. 3 | |
376. |
Find the FTP reply whose message is wrongly matched. |
A. | 331 – username ok, password required |
B. | 425 – can’t open data connection |
C. | 452 – error writing file |
D. | 452 – can’t open data connection |
Answer» E. | |
377. |
FTP is built on _____ architecture. |
A. | client-server |
B. | p2p |
C. | data centric |
D. | service oriented |
Answer» B. p2p | |
378. |
Expansion of FTP is __________ |
A. | fine transfer protocol |
B. | file transfer protocol |
C. | first transfer protocol |
D. | fast transfer protocol |
Answer» C. first transfer protocol | |
379. |
In File Transfer Protocol, data transfer cannot be done in ___________ |
A. | stream mode |
B. | block mode |
C. | compressed mode |
D. | message mode |
Answer» E. | |
380. |
The File Transfer Protocol is built on ______________ |
A. | data centric architecture |
B. | service oriented architecture |
C. | client server architecture |
D. | connection oriented architecture |
Answer» D. connection oriented architecture | |
381. |
FTP server listens for connection on port number ____________ |
A. | 20 |
B. | 21 |
C. | 22 |
D. | 23 |
Answer» C. 22 | |
382. |
The __________ method when used in the method field, leaves entity body empty. |
A. | post |
B. | send |
C. | get |
D. | put |
Answer» D. put | |
383. |
Which of the following is not correct? |
A. | web cache doesnt has its own disk space |
B. | web cache can act both like server and client |
C. | web cache might reduce the response time |
D. | web cache contains copies of recently requested objects |
Answer» B. web cache can act both like server and client | |
384. |
The first line of HTTP request message is called _____________ |
A. | request line |
B. | header line |
C. | status line |
D. | entity line |
Answer» B. header line | |
385. |
The HTTP request message is sent in _________ part of three-way handshake. |
A. | first |
B. | second |
C. | third |
D. | fourth |
Answer» D. fourth | |
386. |
When displaying a web page, the application layer uses the _____________ |
A. | http protocol |
B. | ftp protocol |
C. | smtp protocol |
D. | tcp protocol |
Answer» B. ftp protocol | |
387. |
Application layer protocol defines ____________ |
A. | types of messages exchanged |
B. | message format, syntax and semantics |
C. | rules for when and how processes send and respond to messages |
D. | all of the mentioned |
Answer» E. | |
388. |
The ____________ translates internet domain and host names to IP address. |
A. | domain name system |
B. | routing information protocol |
C. | network time protocol |
D. | internet relay chat |
Answer» B. routing information protocol | |
389. |
Electronic mail uses which Application layer protocol? |
A. | smtp |
B. | http |
C. | ftp |
D. | sip |
Answer» B. http | |
390. |
Transport services available to applications in one or another form _________ |
A. | reliable data transfer |
B. | timing |
C. | security |
D. | all of the mentioned |
Answer» E. | |
391. |
Which is a time-sensitive service? |
A. | file transfer |
B. | file download |
C. | |
D. | internet telephony |
Answer» E. | |
392. |
Pick the odd one out. |
A. | file transfer |
B. | file download |
C. | |
D. | interactive games |
Answer» E. | |
393. |
Which of the following is an application layer service? |
A. | network virtual terminal |
B. | file transfer, access, and management |
C. | mail service |
D. | all of the mentioned |
Answer» E. | |
394. |
E-mail is _________ |
A. | loss-tolerant application |
B. | bandwidth-sensitive application |
C. | elastic application |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
395. |
Application layer offers _______ service. |
A. | end to end |
B. | process to process |
C. | both end to end and process to process |
D. | none of the mentioned |
Answer» B. process to process | |
396. |
Which one of the following is an architecture paradigms? |
A. | peer to peer |
B. | client-server |
C. | http |
D. | both peer-to-peer & client-server |
Answer» E. | |
397. |
Which is not a application layer protocol? |
A. | http |
B. | smtp |
C. | ftp |
D. | tcp |
Answer» E. | |
398. |
Which of the following is not an application layer service? |
A. | network virtual terminal |
B. | file transfer, access, and management |
C. | mail service |
D. | error control |
Answer» E. | |
399. |
In _________ systems, resources are allocated on demand. |
A. | packet switching |
B. | circuit switching |
C. | line switching |
D. | frequency switching |
Answer» B. circuit switching | |
400. |
What are the Methods to move data through a network of links and switches? |
A. | packet switching and line switching |
B. | circuit switching and line switching |
C. | line switching and bit switching |
D. | packet switching and circuit switching |
Answer» E. | |