
This is the Multiple Choice Questions Part 9 of the Series on Computer Network and Networking as one of the Communication Engineering (EST) and Electronics Engineering topics. In Preparation for the ECE Board Exam make sure to expose yourself and familiarize yourself in each and every question compiled here taken from various sources including but not limited to past Board Exam Questions in Communication Engineering and Electronics Engineering field, Communications Books, Electronics Books, Journals and other Communications and Electronics References.
Continue Practice Exam Test Questions Part 9 of the Series
⇐ MCQ in Computer Network and Networking Part 8 | ECE Board Exam
Choose the letter of the best answer in each question.
401. Which one of the following protocols is used to receive mail messages?
A. smtp
B. post office protocol (pop)
C. internet message access protocol (imap)
D. ftp
Answer: Option D
Explanation:
402. What is on-demand mail relay (ODMR)?
A. protocol for smtp security
B. an smtp extension
C. protocol for web pages
D. protocol for faster mail transfer
Answer: Option B
Explanation:
403. An email client needs to know the _________ of its initial SMTP server.
A. ip address
B. mac address
C. url
D. name
Answer: Option A
Explanation:
404. An SMTP session may not include _______
A. zero smtp transaction
B. one smtp transaction
C. more than one smtp transaction
D. one http transaction
Answer: Option D
Explanation:
405. SMTP defines _______
A. message transport
B. message encryption
C. message content
D. message password
Answer: Option A
Explanation:
406. SMTP is not used to deliver messages to ______
A. user’s terminal
B. user’s mailbox
C. user’s word processor
D. user’s email client
Answer: Option C
Explanation:
407. The entire hostname has a maximum of ___________
A. 255 characters
B. 127 characters
C. 63 characters
D. 31 characters
Answer: Option A
Explanation:
408. A DNS client is called _________
A. dns updater
B. dns resolver
C. dns handler
D. none of the mentioned
Answer: Option B
Explanation:
409. Servers handle requests for other domains _______
A. directly
B. by contacting remote dns server
C. it is not possible
D. none of the mentioned
Answer: Option B
Explanation:
410. DNS database contains _______
A. name server records
B. hostname-to-address records
C. hostname aliases
D. all of the mentioned
Answer: Option D
Explanation:
411. If a server has no clue about where to find the address for a hostname, then _______
A. server asks to the root server
B. server asks to its adjacent server
C. request is not processed
D. none of the mentioned
Answer: Option A
Explanation:
412. Wildcard domain names start with label _______
A. @
B. *
C. &
D. #
Answer: Option B
Explanation:
413. The domain name system is maintained by _______
A. distributed database system
B. a single server
C. a single computer
D. none of the mentioned
Answer: Option A
Explanation:
414. Secure shell (SSH) network protocol is used for __________
A. secure data communication
B. remote command-line login
C. remote command execution
D. all of the mentioned
Answer: Option D
Explanation:
415. SSH can be used in only _____________
A. unix-like operating systems
B. windows
C. both unix-like and windows systems
D. none of the mentioned
Answer: Option C
Explanation:
416. SSH uses ___________ to authenticate the remote computer.
A. public-key cryptography
B. private-key cryptography
C. any of public-key or private-key
D. both public-key & private-key
Answer: Option A
Explanation:
417. Which standard TCP port is assigned for contacting SSH servers?
A. port 21
B. port 22
C. port 23
D. port 24
Answer: Option B
Explanation:
418. Which one of the following is a file transfer protocol using SSH?
A. scp
B. sftp
C. rsync
D. all of the mentioned
Answer: Option D
Explanation:
419. SSH-2 does not contain ______________
A. transport layer
B. user authentication layer
C. physical layer
D. connection layer
Answer: Option C
Explanation:
420. Which one of the following features was present in SSH protocol, version 1?
A. password changing
B. periodic replacement of session keys
C. support for public-key certificates
D. none of the mentioned
Answer: Option D
Explanation:
421. SCP protocol is evolved from __________ over SSH.
A. rcp protocol
B. dhcp protocol
C. mgcp protocol
D. gcp protocol
Answer: Option A
Explanation:
422. Which one of the following authentication methods is used by SSH?
A. public-key
B. host based
C. password
D. all of the mentioned
Answer: Option D
Explanation:
423. DHCP (dynamic host configuration protocol) provides __________ to the client.
A. ip address
B. mac address
C. url
D. none of the mentioned
Answer: Option A
Explanation:
424. DHCP is used for ________
A. ipv6
B. ipv4
C. both ipv6 and ipv4
D. none of the mentioned
Answer: Option C
Explanation:
425. The DHCP server _________
A. maintains a database of available ip addresses
B. maintains the information about client configuration parameters
C. grants an ip address when receives a request from a client
D. all of the mentioned
Answer: Option D
Explanation:
426. IP assigned for a client by DHCP server is
A. for a limited period
B. for an unlimited period
C. not time dependent
D. none of the mentioned
Answer: Option A
Explanation:
427. DHCP uses UDP port _________ for sending data to the server.
A. 66
B. 67
C. 68
D. 69
Answer: Option B
Explanation:
428. DHCP client and servers on the same subnet communicate via _________
A. udp broadcast
B. udp unicast
C. tcp broadcast
D. tcp unicast
Answer: Option A
Explanation:
429. WPA2 is used for security in _______
A. ethernet
B. bluetooth
C. wi-fi
D. email
Answer: Option C
Explanation:
430. VPNs are financially speaking __________
A. always more expensive than leased lines
B. always cheaper than leased lines
C. usually cheaper than leased lines
D. usually more expensive than leased lines
Answer: Option C
Explanation:
431. Storage management comprises of _______________
A. san management
B. data protection
C. disk operation
D. all of the mentioned
Answer: Option D
Explanation:
432. Which of the following is not a storage device?
A. switch
B. raid arrays
C. tape drives
D. hub
Answer: Option D
Explanation:
433. Which protocols are used for Storage management?
A. snmp
B. ldap
C. pop3
D. mib
Answer: Option A
Explanation:
434. How do Storage administrators ensure secure access to storage devices?
A. by using zoning
B. by putting a physical lock on the storage device
C. by keeping devices shutdown when not in use
D. by keeping devices when used
Answer: Option A
Explanation:
435. Effective Storage management does not include __________
A. security
B. backups
C. reporting
D. connection
Answer: Option D
Explanation:
436. SMI-S Standard uses which of the following?
A. java rmi
B. cim-xml/http
C. corba
D. .net
Answer: Option B
Explanation:
437. Full duplex mode increases the capacity of each domain by ________
A. 10 to 20 mbps
B. 20 to 30 mbps
C. 30 to 40 mbps
D. 40 to 50 mbps
Answer: Option A
Explanation:
438. Configuration management can be divided into which two subsystems?
A. reconfiguration and documentation
B. management and configuration
C. documentation and dialing up
D. configuration and dialing up
Answer: Option A
Explanation:
439. To use a Simple Network Management System, we need _______
A. servers
B. ip
C. protocols
D. rules
Answer: Option D
Explanation:
440. The main difference between SNMPv3 and SNMPv2 is _______
A. management
B. integration
C. classification
D. enhanced security
Answer: Option D
Explanation:
441. BER stands for ________
A. basic encoding rules
B. basic encoding resolver
C. basic encoding rotator
D. basic encoding router
Answer: Option A
Explanation:
442. SNMP is the framework for managing devices in an internet using the ______
A. tcp/ip protocol
B. udp
C. smtp
D. none
Answer: Option A
Explanation:
443. Structure of Management Information (SMI), is the guideline of ________
A. http
B. snmp
C. url
D. mib
Answer: Option B
Explanation:
444. The application layer protocol used by a Telnet application is ________
A. telnet
B. ftp
C. http
D. smtp
Answer: Option A
Explanation:
445. _______ allows you to connect and login to a remote computer
A. telnet
B. ftp
C. http
D. smtp
Answer: Option A
Explanation:
446. Telnet is used for _______
A. television on net
B. network of telephones
C. remote login
D. teleshopping site
Answer: Option C
Explanation:
447. Which one of the following is not correct?
A. telnet is a general-purpose client-server program
B. telnet lets user access an application on a remote computer
C. telnet can also be used for file transfer
D. telnet can be used for remote login
Answer: Option C
Explanation:
448. Which operating mode of telnet is full duplex?
A. default mode
B. server mode
C. line mode
D. character mode
Answer: Option C
Explanation:
449. If we want that a character be interpreted by the client instead of server _________
A. interpret as command (iac) escape character has to be used
B. control functions has to be disabled
C. it is not possible
D. cli character has to be used
Answer: Option A
Explanation:
450. Telnet protocol is used to establish a connection to __________
A. tcp port number 21
B. tcp port number 22
C. tcp port number 23
D. tcp port number 25
Answer: Option C
Explanation:
- MCQ in Computer Network and Networking Part 20 | ECE Board Exam
- MCQ in Computer Network and Networking Part 19 | ECE Board Exam
- MCQ in Computer Network and Networking Part 18 | ECE Board Exam
- MCQ in Computer Network and Networking Part 17 | ECE Board Exam
- MCQ in Computer Network and Networking Part 16 | ECE Board Exam
- MCQ in Computer Network and Networking Part 15 | ECE Board Exam
- MCQ in Computer Network and Networking Part 14 | ECE Board Exam
- MCQ in Computer Network and Networking Part 13 | ECE Board Exam
- MCQ in Computer Network and Networking Part 12 | ECE Board Exam
- MCQ in Computer Network and Networking Part 11 | ECE Board Exam
- MCQ in Computer Network and Networking Part 10 | ECE Board Exam
- MCQ in Computer Network and Networking Part 9 | ECE Board Exam
- MCQ in Computer Network and Networking Part 8 | ECE Board Exam
- MCQ in Computer Network and Networking Part 7 | ECE Board Exam
- MCQ in Computer Network and Networking Part 6 | ECE Board Exam
- MCQ in Computer Network and Networking Part 5 | ECE Board Exam
- MCQ in Computer Network and Networking Part 4 | ECE Board Exam
- MCQ in Computer Network and Networking Part 3 | ECE Board Exam
- MCQ in Computer Network and Networking Part 2 | ECE Board Exam
- MCQ in Computer Network and Networking Part 1 | ECE Board Exam
MCQ in Computer Fundamentals Series
Complete List of MCQ in Communications Engineering per topic
Complete List of MCQ in Electronics Engineering per topic
P inoyBIX educates thousands of reviewers and students a day in preparation for their board examinations. Also provides professionals with materials for their lectures and practice exams. Help me go forward with the same spirit.
“Will you subscribe today via YOUTUBE?”
TIRED OF ADS?
- Become Premium Member and experienced fewer ads to ads-free browsing.
- Full Content Access Exclusive to Premium members
- Access to PINOYBIX FREEBIES folder
- Download Reviewers and Learning Materials Free
- Download Content: You can see download/print button at the bottom of each post.
PINOYBIX FREEBIES FOR PREMIUM MEMBERSHIP:
- CIVIL ENGINEERING REVIEWER
- CIVIL SERVICE EXAM REVIEWER
- CRIMINOLOGY REVIEWER
- ELECTRONICS ENGINEERING REVIEWER (ECE/ECT)
- ELECTRICAL ENGINEERING & RME REVIEWER
- FIRE OFFICER EXAMINATION REVIEWER
- LET REVIEWER
- MASTER PLUMBER REVIEWER
- MECHANICAL ENGINEERING REVIEWER
- NAPOLCOM REVIEWER
- Additional upload reviewers and learning materials are also FREE
FOR A LIMITED TIME
If you subscribe for PREMIUM today!
You will receive an additional 1 month of Premium Membership FREE.
For Bronze Membership an additional 2 months of Premium Membership FREE.
For Silver Membership an additional 3 months of Premium Membership FREE.
For Gold Membership an additional 5 months of Premium Membership FREE.
Join the PinoyBIX community.