Simple mail transfer protocol (SMTP) utilizes _________ as the transport layer protocol for electronic mail transfer.

A. TCP
B. UDP
C. DCCP
D. SCTP
Answer: Option a

SMTP connections secured by SSL are known as _____________

A. SMTPS
B. SSMTP
C. SNMP
D. STARTTLS
Answer: Option a

Which one of the following protocols is used to receive mail messages?

A. SMTP
B. Post Office Protocol (POP)
C. Internet Message Access Protocol (IMAP)
D. FTP
Answer: Option b

What is on-demand mail relay (ODMR)?

A. protocol for SMTP security
B. an SMTP extension
C. protocol for web pages
D. protocol for faster mail transfer
Answer: Option b

An email client needs to know the _________ of its initial SMTP server.

A. IP address
B. MAC address
C. URL
D. Name
Answer: Option a

SMTP defines _______

A. message transport
B. message encryption
C. message content
D. message password
Answer: Option a

SMTP is not used to deliver messages to ______

A. user’s terminal
B. user’s mailbox
C. user’s word processor
D. user’s email client
Answer: Option c

DNS database contains _______

A. name server records
B. hostname-to-address records
C. hostname aliases
D. all of the mentioned
Answer: Option d

Wildcard domain names start with label _______

A. @
B. *
C. &
D. #
Answer: Option b

DHCP (dynamic host configuration protocol) provides __________ to the client.

A. IP address
B. MAC address
C. Url
D. None of the mentioned
Answer: Option a

DHCP is used for ________

A. IPv6
B. IPv4
C. Both IPv6 and IPv4
D. None of the mentioned
Answer: Option c

The DHCP server _________

A. maintains a database of available IP addresses
B. maintains the information about client configuration parameters
C. grants an IP address when receives a request from a client
D. all of the mentioned
Answer: Option d

After obtaining the IP address, to prevent the IP conflict the client may use _________

A. internet relay chat
B. broader gateway protocol
C. address resolution protocol
D. none of the mentioned
Answer: Option c

Which component is included in IP security?

A. Authentication Header (AH)
B. Encapsulating Security Payload (ESP)
C. Internet key Exchange (IKE)
D. All of the mentioned
Answer: Option d

When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called _________

A. DNS lookup
B. DNS hijacking
C. DNS spoofing
D. DNS authorizing
Answer: Option c

Leave a Comment