Simple mail transfer protocol (SMTP) utilizes _________ as the transport layer protocol for electronic mail transfer.
A. TCP
B. UDP
C. DCCP
D. SCTP
Answer: Option a
SMTP connections secured by SSL are known as _____________
A. SMTPS
B. SSMTP
C. SNMP
D. STARTTLS
Answer: Option a
Which one of the following protocols is used to receive mail messages?
A. SMTP
B. Post Office Protocol (POP)
C. Internet Message Access Protocol (IMAP)
D. FTP
Answer: Option b
What is on-demand mail relay (ODMR)?
A. protocol for SMTP security
B. an SMTP extension
C. protocol for web pages
D. protocol for faster mail transfer
Answer: Option b
An email client needs to know the _________ of its initial SMTP server.
A. IP address
B. MAC address
C. URL
D. Name
Answer: Option a
SMTP defines _______
A. message transport
B. message encryption
C. message content
D. message password
Answer: Option a
SMTP is not used to deliver messages to ______
A. user’s terminal
B. user’s mailbox
C. user’s word processor
D. user’s email client
Answer: Option c
DNS database contains _______
A. name server records
B. hostname-to-address records
C. hostname aliases
D. all of the mentioned
Answer: Option d
Wildcard domain names start with label _______
A. @
B. *
C. &
D. #
Answer: Option b
DHCP (dynamic host configuration protocol) provides __________ to the client.
A. IP address
B. MAC address
C. Url
D. None of the mentioned
Answer: Option a
DHCP is used for ________
A. IPv6
B. IPv4
C. Both IPv6 and IPv4
D. None of the mentioned
Answer: Option c
The DHCP server _________
A. maintains a database of available IP addresses
B. maintains the information about client configuration parameters
C. grants an IP address when receives a request from a client
D. all of the mentioned
Answer: Option d
After obtaining the IP address, to prevent the IP conflict the client may use _________
A. internet relay chat
B. broader gateway protocol
C. address resolution protocol
D. none of the mentioned
Answer: Option c
Which component is included in IP security?
A. Authentication Header (AH)
B. Encapsulating Security Payload (ESP)
C. Internet key Exchange (IKE)
D. All of the mentioned
Answer: Option d
A. DNS lookup
B. DNS hijacking
C. DNS spoofing
D. DNS authorizing
Answer: Option c
Leave a Comment