Networking | Email & Email Protocols Aptitude Questions and Answers

Networking | Email & Email Protocols Aptitude Questions and Answers: This section contains aptitude questions and answers on Networking | Email & Email Protocols.
Submitted by Nidhi, on June 01, 2021

Networking Email & Email Protocols Aptitude Questions and Answers

1) There are following statements that are given below, which of them are correct about emails?

  1. E-mail stands for Electronic Mail.
  2. E-mail is used for sending and receiving text, images, and video files.
  3. E-mail is also used for identity in the internet world.
  4. E-mails are not secured enough for data transmission.

Options:

  1. A and B
  2. B and C
  3. A, B, and C
  4. A, B, C, and D

2) In which year e-mail was invented?

  1. 1971
  2. 1972
  3. 1975
  4. 1977

3) Who was invented email?

  1. Ray Tomlinson
  2. Robert E. Kahn
  3. Shiva Ayyaduria
  4. Vint Cerf

4) There are following statements that are given below, which of them are correct about email addresses?

  1. E-mail addresses are case sensitive.
  2. E-mail address contains the domain name and user name.
  3. In the e-mail address, the user name and domain name are separated by the dollar symbol.
  4. E-mail addresses cannot be duplicated.

Options:

  1. A and B
  2. B and D
  3. A, B, and C
  4. A, B, and D

5) What is the full form of BCC in email?

  1. Basic Carbon Copy
  2. Blind Carbon Copy
  3. Black Carbon Copy
  4. Blind Clone Copy


6) What are the core components of the email system?

  1. Email client
  2. Email server
  3. Internet service provider
  4. All the above

Options:

  1. A and B
  2. B and D
  3. A and C
  4. D

7) Which of the following are not valid email client software?

  1. Microsoft Outlook
  2. Thunderbird
  3. eM Client
  4. Mailbird

Options:

  1. B
  2. B and C
  3. D
  4. All are valid email client software

8) Which of the following protocols are used for email?

  1. SMTP
  2. POP
  3. ICMP
  4. IMAP

Options:

  1. A and B
  2. A and C
  3. A, B, and C
  4. A, B, and D

9) There are following statements that are given below, which of them are correct about SMTP?

  1. It is an application layer protocol.
  2. It is a connectionless protocol.
  3. SMTP stands for Simple Mail Transfer Protocol.
  4. SMTP is a text-based protocol.

Options:

  1. A and B
  2. A and C
  3. A, C, and D
  4. A, B, and C

10) In which year, the SMTP was proposed the first time?

  1. 1980
  2. 1982
  3. 1983
  4. 1988


11) Which command is used to initiate the SMTP conversation?

  1. EHELLO
  2. CHELLO
  3. HELLO
  4. HELLOMAIL

12) Which command is used to terminate the SMTP connection?

  1. TERM
  2. QUIT
  3. EXIT
  4. FINISH

13) What is the full form of MTA used in SMTP?

  1. Mail Time Association
  2. Mail Trim Agent
  3. Mail Transmission Agent
  4. Mail Transfer Agent

14) Which of the following is not the component of the SMTP protocol?

  1. Mail Transfer Agent
  2. User Agent
  3. Server Agent
  4. None of the above

15) IMAP stands for?

  1. Invoice Mail Access Protocol
  2. Internet Mail Access Protocol
  3. Internal Mail Access Protocol
  4. International Mail Access Protocol


16) There are following statements that are given below, which of them are correct about IMAP?

  1. The IMAP is used to manipulate email messaging without downloading it on a local machine.
  2. It is used to access multiple mailboxes concurrently.
  3. IMAP enables users to search for emails.
  4. All the above

Options:

  1. A and B
  2. A and C
  3. B and C
  4. D

17) Which of the following are correct commands used in IMAP protocol?

  1. CREATE
  2. DELETE
  3. RENAME
  4. NOOP

Options:

  1. A and B
  2. A and C
  3. B, C, and D
  4. A, B, C, and D

18) Which of the following command is used to select a mailbox to access the email messages?

  1. ACCESS
  2. SELECT
  3. NOOP
  4. None of the above

19) There are following statements that are given below, which of them are correct about POP?

  1. POP stands for Post Office Protocol.
  2. POP is used to support a single client.
  3. POP supports offline access to messages.
  4. All of the above

Options:

  1. A and B
  2. A and C
  3. B and C
  4. D

20) The Post Office Protocol does not support the search facility?

  1. Yes
  2. No

21) Which of the following are correct commands used in the POP protocol?

  1. STAT
  2. LIST
  3. DELETE
  4. RSET

Options:

  1. A and B
  2. A and C
  3. A, B, and D
  4. D

22) Which POP command is used to open a connection?

  1. OPEN
  2. LOGIN
  3. CONNECT
  4. ESTABLISH

23) Which POP command is used to log off the session?

  1. LOGOUT
  2. LOGOFF
  3. QUIT
  4. EXIT

24) Which of the following RFC numbers are related to POP?

  1. RFC 918
  2. RFC 937
  3. RFC 1081
  4. RFC 1939

Options:

  1. A and B
  2. A and C
  3. A, B, and C
  4. A, B, C, and D

25) Which POP command is used to delete a message?

  1. DELETE
  2. DEL
  3. DELE
  4. REMOVE


Comments and Discussions!

Load comments ↻






Copyright © 2024 www.includehelp.com. All rights reserved.