Home »
Aptitude Questions and Answers »
Networking Aptitude Questions
Networking | Email & Email Protocols Aptitude Questions and Answers
Networking | Email & Email Protocols Aptitude Questions and Answers: This section contains aptitude questions and answers on Networking | Email & Email Protocols.
Submitted by Nidhi, on June 01, 2021
Networking Email & Email Protocols Aptitude Questions and Answers
1) There are following statements that are given below, which of them are correct about emails?
- E-mail stands for Electronic Mail.
- E-mail is used for sending and receiving text, images, and video files.
- E-mail is also used for identity in the internet world.
- E-mails are not secured enough for data transmission.
Options:
- A and B
- B and C
- A, B, and C
- A, B, C, and D
Correct answer: 3
A, B, and C
Explanation:
Statements A, B, and C are correct about emails.
2) In which year e-mail was invented?
- 1971
- 1972
- 1975
- 1977
Correct answer: 2
1972
Explanation:
The e-mail was invented in 1972.
3) Who was invented email?
- Ray Tomlinson
- Robert E. Kahn
- Shiva Ayyaduria
- Vint Cerf
Correct answer: 1
Ray Tomlinson
Explanation:
The email was invented by Ray Tomlinson.
4) There are following statements that are given below, which of them are correct about email addresses?
- E-mail addresses are case sensitive.
- E-mail address contains the domain name and user name.
- In the e-mail address, the user name and domain name are separated by the dollar symbol.
- E-mail addresses cannot be duplicated.
Options:
- A and B
- B and D
- A, B, and C
- A, B, and D
Correct answer: 2
B and D
Explanation:
Statements B and D are correct about email addresses.
5) What is the full form of BCC in email?
- Basic Carbon Copy
- Blind Carbon Copy
- Black Carbon Copy
- Blind Clone Copy
Correct answer: 2
Blind Carbon Copy
Explanation:
The BCC stands for Blind Carbon Copy.
6) What are the core components of the email system?
- Email client
- Email server
- Internet service provider
- All the above
Options:
- A and B
- B and D
- A and C
- D
Correct answer: 4
D
Explanation:
All given options are core components of email systems.
7) Which of the following are not valid email client software?
- Microsoft Outlook
- Thunderbird
- eM Client
- Mailbird
Options:
- B
- B and C
- D
- All are valid email client software
Correct answer: 4
All are valid email client software
Explanation:
All given options are correct email client software.
8) Which of the following protocols are used for email?
- SMTP
- POP
- ICMP
- IMAP
Options:
- A and B
- A and C
- A, B, and C
- A, B, and D
Correct answer: 4
A, B, and D
Explanation:
The SMTP, POP, and IMAP protocols are used for email.
9) There are following statements that are given below, which of them are correct about SMTP?
- It is an application layer protocol.
- It is a connectionless protocol.
- SMTP stands for Simple Mail Transfer Protocol.
- SMTP is a text-based protocol.
Options:
- A and B
- A and C
- A, C, and D
- A, B, and C
Correct answer: 3
A, C, and D
Explanation:
Statement A, C, and D are correct about SMTP.
10) In which year, the SMTP was proposed the first time?
- 1980
- 1982
- 1983
- 1988
Correct answer: 2
1982
Explanation:
The SMTP was first proposed in 1982.
11) Which command is used to initiate the SMTP conversation?
- EHELLO
- CHELLO
- HELLO
- HELLOMAIL
Correct answer: 3
HELLO
Explanation:
The HELLO command is used to initiate the SMTP conversation.
12) Which command is used to terminate the SMTP connection?
- TERM
- QUIT
- EXIT
- FINISH
Correct answer: 2
QUIT
Explanation:
The QUIT command is used to terminate the SMTP connection.
13) What is the full form of MTA used in SMTP?
- Mail Time Association
- Mail Trim Agent
- Mail Transmission Agent
- Mail Transfer Agent
Correct answer: 4
Mail Transfer Agent
Explanation:
The MTA stands for Mail Transfer Agent.
14) Which of the following is not the component of the SMTP protocol?
- Mail Transfer Agent
- User Agent
- Server Agent
- None of the above
Correct answer: 3
Server Agent
Explanation:
The Server Agent is not the component of the SMTP protocol.
15) IMAP stands for?
- Invoice Mail Access Protocol
- Internet Mail Access Protocol
- Internal Mail Access Protocol
- International Mail Access Protocol
Correct answer: 2
Internet Mail Access Protocol
Explanation:
The IMAP stands for Internet Mail Access Protocol.
16) There are following statements that are given below, which of them are correct about IMAP?
- The IMAP is used to manipulate email messaging without downloading it on a local machine.
- It is used to access multiple mailboxes concurrently.
- IMAP enables users to search for emails.
- All the above
Options:
- A and B
- A and C
- B and C
- D
Correct answer: 4
D
Explanation:
All given statements are correct about IMAP.
17) Which of the following are correct commands used in IMAP protocol?
- CREATE
- DELETE
- RENAME
- NOOP
Options:
- A and B
- A and C
- B, C, and D
- A, B, C, and D
Correct answer: 4
A, B, C, and D
Explanation:
All given options are correct commands used in IMAP protocol.
18) Which of the following command is used to select a mailbox to access the email messages?
- ACCESS
- SELECT
- NOOP
- None of the above
Correct answer: 2
SELECT
Explanation:
The SELECT command is used to select a mailbox to access the email messages.
19) There are following statements that are given below, which of them are correct about POP?
- POP stands for Post Office Protocol.
- POP is used to support a single client.
- POP supports offline access to messages.
- All of the above
Options:
- A and B
- A and C
- B and C
- D
Correct answer: 4
D
Explanation:
All given statements are correct about POP.
20) The Post Office Protocol does not support the search facility?
- Yes
- No
Correct answer: 1
Yes
Explanation:
Yes, The Post Office Protocol does not support the search facility.
21) Which of the following are correct commands used in the POP protocol?
- STAT
- LIST
- DELETE
- RSET
Options:
- A and B
- A and C
- A, B, and D
- D
Correct answer: 3
A, B, and D
Explanation:
The Options A, B, and D are correct commands used in the POP protocol.
22) Which POP command is used to open a connection?
- OPEN
- LOGIN
- CONNECT
- ESTABLISH
Correct answer: 2
LOGIN
Explanation:
The LOGIN command is used to open a connection.
23) Which POP command is used to log off the session?
- LOGOUT
- LOGOFF
- QUIT
- EXIT
Correct answer: 3
QUIT
Explanation:
The QUIT command is used to log off the session.
24) Which of the following RFC numbers are related to POP?
- RFC 918
- RFC 937
- RFC 1081
- RFC 1939
Options:
- A and B
- A and C
- A, B, and C
- A, B, C, and D
Correct answer: 4
A, B, C, and D
Explanation:
All given options are related to POP.
25) Which POP command is used to delete a message?
- DELETE
- DEL
- DELE
- REMOVE
Correct answer: 3
DELE
Explanation:
The DELE command is used to delete a message.