You are on page 1of 5

Your Results:

The correct answer for each question is indicated by a .

1 CORRECT Which of the following is true?

A)Telnet uses the telnet protocol.


B)Telnet uses the rlogin protocol.
C)Telnet and rlogin are identical.
D)Telnet and FTP have the same functionality.
Feedback: Correct!

2 INCORRECT Which of the following choices best describes the utility of Telnet?

A)Telnet allows you to transfer files between two computers.


B)Telnet allows you to connect and login to a remote computer.
C)Telnet allows you to network to the Internet.
D)Telnet can be used to retrieve images on the Web.
Feedback: This is not correct.
To Telnet to the machine hopper.unh.edu through a Web browser you should
3 CORRECT
type which of the following in the location area?
A)telnet:hopper.unh.edu
B)Telnet:hopper.unh.edu
C)telnet:$\backslash$$\backslash$hopper.unh.edu
D)telnet://hopper.unh.edu
Feedback: Correct!
Choose the answer containing the most types of operating systems that have
4 CORRECT
Telnet clients available to them.
A)Windows95 and Unix
B)MacOS and Windows98
C)WindowsNT, Unix, and MacOS
D)Windows95, Windows98, Unix, and MacOS
Feedback: Correct!
To display help about the rlogin command from a Unix system, you would enter
5 INCORRECT
which of the following?
A)help rlogin
B)man rlogin
C)manual rlogin
D)? rlogin
Feedback: This is not correct.

6 INCORRECT What is the correct syntax for user mary to rlogin to host bert?

A)rlogin -l bert mary


B)rlogin -1 bert mary
C)rlogin -1 mary bert
D)rlogin -l mary bert
Feedback: This is not correct.

7 INCORRECT Which of the following statements is true?


A)Telnet does not prompt you for a password most of the time.
B)Rlogin is quicker and more secure than Telnet.
C)Rlogin will echo your password on the screen
D)Rlogin will prompt you for a password.
Feedback: This is not correct.

8 INCORRECT FTP stands for

A)Find Transfer Protocol


B)Finder Transfer Protocol
C)File Transfer Protocol
D)File Transferring Protocol
Feedback: This is not correct.

9 CORRECT Which of the following is not a mode of a standard graphical FTP client?

A)Auto
B)Binary
C)GIF
D)ASCII
Feedback: Correct!

10 INCORRECT Which mode should compressed files be transferred in?

A)Binary
B)ASCII
C)GIF
D)Plaintext
Feedback: This is not correct.

11 INCORRECT Which of the following is not a valid command to type in to the Unix ftp prompt?

A)?
B)get
C)put
D)pwt
Feedback: This is a valid command.
Which Unix ftp command is used to list the directory contents of the remote
12 CORRECT
machine?
A)lcd
B)cd
C)ls
D)dir
Feedback: Correct!

13 INCORRECT Which answer best describes the purpose of file compression?

A)Encrypt information.
B)Reduce storage space required for a file.
C)Hide information.
D)Recode the file into binary.
Feedback: This is not correct.

14 INCORRECT Which of the following is not a commonly used file compression utility?

A)PKZIP
B)gzip
C)compress
D)shrinker
Feedback: This is.

15 INCORRECT Which of the following statements is false?

A)Any compressed file can be decompressed with any compression


program.
B)There are files whose space can not be compressed.
C)Most compressed files are larger than the original.
D)Gzip works well with gunzip.
Feedback: This is a true statement.

16 INCORRECT Anonymous file transfer is best used for which of the following?

A)Distributing freeware.
B)Distributing email.
C)File compression.
D)Letting people get secretive documents without revealing their
identities.
Feedback: Anonymous FTP would not be used for secretive.

17 INCORRECT Which of the following statements is false?

A)There are text-based FTP clients.


B)There are graphical-based FTP clients.
C)FTP can be launched through the location area of a browser.
D)By typing FTP to the Unix prompt, you can start the Unix file transfer
protocol.
Feedback: This is true.
Which of the following is not a name for an item that could be a security threat
18 INCORRECT
to your computer?
A)Trojan horse
B)metacrawler
C)worm
D)virus
Feedback: This is.

19 INCORRECT Which of the following is the best definition for virus?

A)A program that when run is able to replicate itself and then embed itself
within another program.
B)A series of bits that are spread via phone lines.
C)A file that contains binary data.
D)A computer hacker who spams other users in an annoying fashion.
Feedback: This is not a definition of a virus.
Which of the following is not something you would do to protect yourself from
20 INCORRECT
viruses?
A)Run antivirus software.
B)Download software from unknown sources.
C)Avoid pirated copies of software.
D)Backup your files regularly.
Feedback: This is something you would do.

21 CORRECT Anonymous FTP usually uses which of the following?

A)The user's e-mail address as the account name and the word guest as
the password.
B)The user's e-mail address as the account name and the word
anonymous as the password.
C)The word anonymous as the account name and the user's e-mail
address as the password.
D)The word anonymous as the account name and the user's system
password as the password.
Feedback: Correct!
Ways to copy a file from one computer to another include all but which of the
22 INCORRECT
following?
A)Archie.
B)E-mail the file as an attachment.
C)FTP.
D)Copy the file onto a diskette and then "walk" the diskette over to the
other computer.
Feedback: E-mail is a way to send a file.

23 INCORRECT Which of the following statements is false?

A)Archie is a service that maintains databases containing listings of files


from various file transfer sites.
B)One way to find a specific file involves sending e-mail to an Archie site.
C)Another way to find a specific file involves connecting to an Archie
server via Telnet.
D)The name Archie is derived from "file architecture."
Feedback: This is a true statement.

24 INCORRECT Which of the following statements is true?

A)UNIX viruses are rare because hackers are more interested in PCs and
Macs.
B)Backing up your files regularly will not help in the event of a virus since
the backed-up version will probably be infected as well.
C)Nearly all viruses are operating-system specific.
D)If infected by a virus, damage will occur immediately as it fills all
available space on your hard drive.
Feedback: This is false - sometimes damage from a virus occurs later,
after an event triggers the virus to become active.

25 INCORRECT Which of the following best describes a Trojan horse virus?


A)A stand-alone program that tries to gain access to computer systems
via networks.
B)A virus that is transmitted via e-mail and is usually called "Good Times."
C)The Internet Worm which was created by Robert Morris.
D)A legitimate program for carrying out some useful function that has
hidden code.
Feedback: This is not correct.

You might also like