Professional Documents
Culture Documents
When e-mails are sent and received between PCs on the Internet, which of the
following is an appropriate description concerning the selection of
communication
protocols that are used between each pair of PCs and mail servers?
a) Each PC uses POP for sending e-mails and SMTP for receiving them.
b) Each PC uses SMTP for sending e-mails and POP for receiving them.
c) Each PC uses POP for both sending and receiving e-mails.
d) Each PC uses SMTP for both sending and receiving e-mails.
4. When the Internet is accessed from an intranet, which of the following is the
most appropriate mechanism that can be used to relay access to the Internet, to
speed up access to it by caching Web content, and also to ensure security?
a) DMZ b) Firewall
c) Proxy d) Router
5. Which of the following is the most appropriate term that is used to indicate the
location of information on the Internet, and has the standardized format, such
as “http://www.ipa.go.jp/” ?
11. Which of the following is a protocol that is used for synchronization of the
internal clock of a computer via a network with a server that holds a reference
clock?
13. Which of the following ports does POP3 services use, by default?
A. 25
B. 110
C. 143
D. 443
14. Which of the following logical network topologies is used to provide a secure
connection across the Internet?
A. SSL
B. VPN
C. HTTPS
D. TLS
15. Logical addressing today is pretty much exclusively represented by
___________________.
A. MAC Address
B. IP address
C. URL address
D. ARP address
19. Which of the following mobile communication systems not only offers higher
communication speed than LTE, but also allows more devices to connect and
has less communication delay?
a) Block chain b) MVNO
c) 8K d) 5G
20. A DHCP server has been installed in a LAN. When a PC that automatically
acquires information from the DHCP server is to be connected to the LAN,
which of the following will be set in the PC?
a) IP address
b) Latest virus definition file
c) Address list of spam mail
d) Mail addresses assigned by the Internet service provider
21.
22. Which of the following is placed between an internal network and an external
network in order to prevent unauthorized access from the external network to the
internal network?
a) DHCP server b) Search engine
c) Switching hub d) Firewall
23. Mr. A sent an e-mail to the three (3) people Mr. P, Mr. Q, and Mr. R. He entered Mr.
P’s e-mail address in the To field, Mr. Q’s e-mail address in the CC field, and Mr. R’s
email address in the BCC field. Among the recipients of the e-mail Mr. P, Mr. Q, and
Mr. R, which of the following lists contains all and only the people who can know that
the email with the same content is sent to all three (3) people?
A. Mr. P, Mr. Q, Mr. R
B. Mr. P, Mr. R
C. Mr. Q, Mr. R
D. Mr. R
24. Which of the following is the unit of the data transmission speed in a network?
A. bps
B. fps
C. ppm
D. rpm
25. Which of the following is the technology that enables terminals connected to a shared
network such as the Internet to be used as if they are connected to a leased line by
ensuring security with encryption and authentication?
A. ADSL
B. ISDN
C. VPN
D. Wi-Fi