Choose a topic to test your knowledge and improve your MCA skills
The commands, from client to server, and replies, from server to client, are sent across the control connection in ________ bit ASCII format.
Find the FTP reply whose message is wrongly matched.
The data transfer mode of FTP, in which all the fragmenting has to be done by TCP is _______
The password is sent to the server using ________ command.
If you have to send multimedia data over SMTP it has to be encoded into _______
Expansion of SMTP is ________
In SMTP, the command to write receiver’s mail address is written with the command ____
The underlying Transport layer protocol used by SMTP is _____
Choose the statement which is wrong incase of SMTP?
Internet mail places each object in ______
Typically the TCP port used by SMTP is _____
A session may include ______
Which of the following is an example of user agents for e-mail?
When the sender and the receiver of an email are on different systems, we need only _____
User agent does not support this ______
Simple mail transfer protocol (SMTP) utilizes _________ as the transport layer protocol for electronic mail transfer.
SMTP connections secured by SSL are known as ________
SMTP uses which of the following TCP port?
Which one of the following protocol is used to receive mail messages?
What is on-demand mail relay (ODMR)?
An email client needs to know the _________ of its initial SMTP server.
An SMTP session may not include _______
SMTP defines _______
Which one of the following is an SMTP server configured in such a way that anyone on the internet can send e-mail through it?
SMTP is not used to deliver messages to ______
The entire hostname has a maximum of ________
A DNS client is called ____
Servers handle requests for other domains _______
DNS database contains _______
If a server has no clue about where to find the address for a hostname then _______
Which one of the following allows client to update their DNS entry as their IP address change?
Wildcard domain names start with label _______
The right to use a domain name is delegated by domain name registers which are accredited by ______
The domain name system is maintained by _______
Which one of the following is not true?
Secure shell (SSH) network protocol is used for _____
SSH can be used in only _________
SSH uses ___________ to authenticate the remote computer.
Which standard TCP port is assigned for contacting SSH servers?
Which one of the following protocol can be used for login to a shell on a remote host except SSH?
Which one of the following is a file transfer protocol using SSH?
SSH-2 does not contain ________
Which one of the following feature was present in SSH protocol, version 1?
SCP protocol is evolved from __________ over SSH.
Which one of the following authentication method is used by SSH?
DHCP (dynamic host configuration protocol) provides __________ to the client.
DHCP is used for ______
The DHCP server _______
IP assigned for a client by DHCP server is
DHCP uses UDP port _________ for sending data to the server.