Top 1000+ Solved Computer Networks MCQ Questions Answer

From 196 to 210 of 952

Q. An email client needs to know the _________ of its initial SMTP server.

a. ip address

b. mac address

c. url

d. name

  • a. ip address

Q. An SMTP session may not include _______

a. zero smtp transaction

b. one smtp transaction

c. more than one smtp transaction

d. one http transaction

  • d. one http transaction

Q. SMTP defines _______

a. message transport

b. message encryption

c. message content

d. message password

  • a. message transport

Q. SMTP is not used to deliver messages to ______

a. user’s terminal

b. user’s mailbox

c. user’s word processor

d. user’s email client

  • c. user’s word processor

Q. The entire hostname has a maximum of ___________

a. 255 characters

b. 127 characters

c. 63 characters

d. 31 characters

  • a. 255 characters

Q. A DNS client is called _________

a. dns updater

b. dns resolver

c. dns handler

d. none of the mentioned

  • b. dns resolver

Q. Servers handle requests for other domains _______

a. directly

b. by contacting remote dns server

c. it is not possible

d. none of the mentioned

  • b. by contacting remote dns server

Q. DNS database contains _______

a. name server records

b. hostname-to-address records

c. hostname aliases

d. all of the mentioned

  • d. all of the mentioned

Q. If a server has no clue about where to find the address for a hostname then _______

a. server asks to the root server

b. server asks to its adjcent server

c. request is not processed

d. none of the mentioned

  • a. server asks to the root server

Q. The domain name system is maintained by _______

a. distributed database system

b. a single server

c. a single computer

d. none of the mentioned

  • a. distributed database system

Q. Secure shell (SSH) network protocol is used for __________

a. secure data communication

b. remote command-line login

c. remote command execution

d. all of the mentioned

  • d. all of the mentioned

Q. SSH can be used in only _____________

a. unix-like operating systems

b. windows

c. both unix-like and windows systems

d. none of the mentioned

  • c. both unix-like and windows systems

Q. SSH uses ___________ to authenticate the remote computer.

a. public-key cryptography

b. private-key cryptography

c. any of public-key or private-key

d. both public-key & private-key

  • a. public-key cryptography

Q. Which standard TCP port is assigned for contacting SSH servers?

a. port 21

b. port 22

c. port 23

d. port 24

  • b. port 22
Subscribe Now

Get All Updates & News