|
1 | | TELNET is an abbreviation for ____________. |
|
| | A) | terminal network |
| | B) | telephone network |
| | C) | telecommunication network |
| | D) | none of the above |
|
2 | | TELNET is a ________ client-server application program. |
|
| | A) | specific-purpose |
| | B) | general-purpose |
| | C) | both a and b |
| | D) | none of the above |
|
3 | | When a user logs into a local time-sharing system, it is called ________ login. |
|
| | A) | local |
| | B) | remote |
| | C) | temporary |
| | D) | none of the above |
|
4 | | When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login. |
|
| | A) | local |
| | B) | remote |
| | C) | temporary |
| | D) | none of the above |
|
5 | | NVT uses two sets of characters, one for _____and one for __________. |
|
| | A) | sending; receiving |
| | B) | request; reply |
| | C) | data; control |
| | D) | none of the above |
|
6 | | For data, NVT uses US ASCII characters with the highest order bit set to ______. |
|
| | A) | 1 |
| | B) | 0 |
| | C) | a or b |
| | D) | none of the above |
|
7 | | For control, NVT uses US ASCII characters with the highest order bit set to ______. |
|
| | A) | 1 |
| | B) | 0 |
| | C) | a or b |
| | D) | none of the above |
|
8 | | TELNET uses only one TCP connection. The server uses ________ port and the client uses ________ port. |
|
| | A) | a well-known; another well-known |
| | B) | an ephemeral; another ephemeral |
| | C) | a well-known; an ephemeral |
| | D) | none of the above |
|
9 | | To distinguish data from control characters, each sequence of control characters is preceded by a special control character called ________. |
|
| | A) | ICA |
| | B) | IAC |
| | C) | AIC |
| | D) | none of the above |
|
10 | | In the _______ mode, the echoing is done by the client. |
|
| | A) | default |
| | B) | character |
| | C) | line |
| | D) | none of the above |
|
11 | | In the _______ mode, each character typed is sent by the client to the server. |
|
| | A) | default |
| | B) | character |
| | C) | line |
| | D) | none of the above |
|
12 | | In the ____ mode, line editing (echoing, character erasing, line erasing, and so on) is done by the client. |
|
| | A) | default |
| | B) | character |
| | C) | line |
| | D) | none of the above |
|
13 | | The _______ is software residing on the remote system that allows the remote system to receive characters from a TELNET server. |
|
| | A) | terminal driver |
| | B) | pseudoterminal driver |
| | C) | TELNET client |
| | D) | none of the above |
|
14 | | The _______ translates local characters into NVT form. |
|
| | A) | terminal driver |
| | B) | TELNET client |
| | C) | TELNET server |
| | D) | none of the above |
|
15 | | The _______ translates NVT characters into a form acceptable by the remote operating system. |
|
| | A) | terminal driver |
| | B) | TELNET client |
| | C) | TELNET server |
| | D) | none of the above |
|
16 | | If the sender wants to disable an option, it sends a _______ command. |
|
| | A) | WILL |
| | B) | DO |
| | C) | WONT |
| | D) | none of the above |
|
17 | | If the sender wants to enable an option, it sends a _______ command. |
|
| | A) | WILL |
| | B) | DO |
| | C) | WONT |
| | D) | none of the above |
|
18 | | If the sender wants an option disabled by the receiver, it sends a _______ command. |
|
| | A) | WILL |
| | B) | DO |
| | C) | DONT |
| | D) | none of the above |
|
19 | | If the sender wants an option enabled by the receiver, it sends a _______ command. |
|
| | A) | WILL |
| | B) | DO |
| | C) | WONT |
| | D) | none of the above |
|
20 | | _______ is the standard mechanism provided by TCP/IP for copying a file from one host to another. |
|
| | A) | TELNET |
| | B) | SMTP |
| | C) | TFTP |
| | D) | none of the above |
|
21 | | FTP uses the services of ________. |
|
| | A) | UDP |
| | B) | IP |
| | C) | TCP |
| | D) | none of the above |
|
22 | | In FTP, the well-known port ____ is used for the control connection and the well-known port ________ for the data connection. |
|
| | A) | 21; 22 |
| | B) | 21; 20 |
| | C) | 20; 21 |
| | D) | none of the above |
|
23 | | In FTP, _______ is the service type used by the IP protocol because this is an interactive connection between a user (human) and a server. |
|
| | A) | maximize throughput |
| | B) | minimize delay |
| | C) | minimize error |
| | D) | none of the above |
|
24 | | For the control connection, FTP uses the __________ character set |
|
| | A) | regular ASCII |
| | B) | EBCDIC |
| | C) | NVT ASCII |
| | D) | none of the above |
|
25 | | During an FTP session the control connection is opened _______. |
|
| | A) | exactly once |
| | B) | exactly twice |
| | C) | as many times as necessary |
| | D) | none of the above |
|
26 | | During an FTP session the data connection is opened _______. |
|
| | A) | exactly once |
| | B) | exactly twice |
| | C) | as many times as necessary |
| | D) | none of the above |
|
27 | | In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _______. |
|
| | A) | file types |
| | B) | data structures |
| | C) | transmission modes |
| | D) | none of the above |
|
28 | | In FTP, there are three types of _______: stream, block, and compressed. |
|
| | A) | file types |
| | B) | data structures |
| | C) | transmission modes |
| | D) | none of the above |
|
29 | | In FTP, ASCII, EBCDIC, and image define an attribute called _______. |
|
| | A) | file type |
| | B) | data structure |
| | C) | transmission mode |
| | D) | none of the above |
|
30 | | In FTP, when we _______, it is copied from the server to the client. |
|
| | A) | retrieve a file |
| | B) | retrieve a list |
| | C) | a and c |
| | D) | none of the above |
|
31 | | In FTP, when we _______, it is copied from the client to the server. |
|
| | A) | retrieve a file |
| | B) | store a file |
| | C) | retrieve a list |
| | D) | none of the above |
|
32 | | ________ is part of a local hard drive, a special file with permission restrictions. |
|
| | A) | A message |
| | B) | A response |
| | C) | An agent |
| | D) | None of the above |
|
33 | | When the sender and the receiver of an email are on the same system, we need only ___________. |
|
| | A) | one UA |
| | B) | two UAs |
| | C) | one UA and one MTA |
| | D) | none of the above |
|
34 | | When the sender and the receiver of an email are on different systems, we need only _____________. |
|
| | A) | one MTA |
| | B) | two UAs |
| | C) | two UAs and one pair of MTAs |
| | D) | none of the above |
|
35 | | When the sender is connected to the mail server via a LAN or a WAN, we need ______________. |
|
| | A) | two MTA |
| | B) | two UAs and two pairs of MTAs |
| | C) | two UAs and a pair of MTAs |
| | D) | none of the above |
|
36 | | When both sender and receiver are connected to a mail server via a LAN or a WAN, we need ___________________. |
|
| | A) | two UAs, two pairs of MTAs, and a pair of MAAs |
| | B) | two UAs, and two pairs of MTAs |
| | C) | two UAs, two pairs of MTAs, and two pairs of MAAs |
| | D) | none of the above |
|
37 | | ________ provides service to the user to make the process of sending and receiving a message easier. |
|
| | A) | An MTA |
| | B) | An MAA |
| | C) | A UA |
| | D) | none of the above |
|
38 | | Which of the following services is not provided by a UA? |
|
| | A) | composing messages |
| | B) | reading messages |
| | C) | replying messages |
| | D) | all are |
|
39 | | There are two types of user agents: _________ and ___________. |
|
| | A) | command-driven; data-driven |
| | B) | command-driven; GUI-based |
| | C) | command-based and data-based |
| | D) | none of the above |
|
40 | | The ________ usually contains the sender address, the receiver address, and other information. |
|
| | A) | message |
| | B) | envelope |
| | C) | both a and b |
| | D) | none of the above |
|
41 | | The message contains the ________ and the __________. |
|
| | A) | header; envelop |
| | B) | header; body |
| | C) | envelop; body |
| | D) | none of the above |
|
42 | | In the Internet, the email address consists of two parts: a _______ and a _______. |
|
| | A) | local part; domain name |
| | B) | global part; domain name |
| | C) | label; domain name |
| | D) | none of the above |
|
43 | | _________ is a supplementary protocol that allows non-ASCII data to be sent through email. |
|
| | A) | JPEG |
| | B) | MPEG |
| | C) | MIME |
| | D) | none of the above |
|
44 | | The actual mail transfer is done through ____________. |
|
| | A) | UAs |
| | B) | MTAs |
| | C) | MAAs |
| | D) | none of the above |
|
45 | | The formal protocol that defines the MTA client and server in the Internet is called ___________. |
|
| | A) | SMTP |
| | B) | SNMP |
| | C) | TELNET |
| | D) | none of the above |
|
46 | | The process of transferring a mail message occurs in ________ phases. |
|
| | A) | two |
| | B) | four |
| | C) | five |
| | D) | none of the above |
|
47 | | SMTP is a __________protocol. |
|
| | A) | pull |
| | B) | push |
| | C) | both a and b |
| | D) | none of the above |
|
48 | | The third stage in an email transfer needs a ________ protocol. |
|
| | A) | pull |
| | B) | push |
| | C) | both a and b |
| | D) | none of the above |
|
49 | | The third stage in an email transfer uses a(n) ________ protocol. |
|
| | A) | UA |
| | B) | MTA |
| | C) | MAA |
| | D) | none of the above |
|
50 | | Currently two message access protocols are available: _______ and _________. |
|
| | A) | POP3; IMAP2 |
| | B) | POP4; IMAP1 |
| | C) | POP3; IMAP4 |
| | D) | none of the above |
|
51 | | Which part of the mail created by the UA contains the sender and receiver names? |
|
| | A) | envelope |
| | B) | address |
| | C) | header |
| | D) | none of the above |
|
52 | | The MIME _______ header uses text to describe the type of data in the body of the message. |
|
| | A) | content-type |
| | B) | content-transfer-encoding |
| | C) | content-description |
| | D) | none of the above |
|
53 | | _______ is more powerful and complex than _______. |
|
| | A) | POP3; IMAP4 |
| | B) | IMAP4; POP3 |
| | C) | SMTP; POP3 |
| | D) | none of the above |