You are on page 1of 6

1.

When e-mails are sent and received between PCs on the Internet, which of the
following is an appropriate description concerning the selection of
communication
protocols that are used between each pair of PCs and mail servers?
a) Each PC uses POP for sending e-mails and SMTP for receiving them.
b) Each PC uses SMTP for sending e-mails and POP for receiving them.
c) Each PC uses POP for both sending and receiving e-mails.
d) Each PC uses SMTP for both sending and receiving e-mails.

2. Which of the following is a protocol that enables a client to download an e-mail


that
has arrived at the mailbox of a remote server?

a) DNS b) IMAP c) POP3 d) SMTP

3. Which of the following is appropriate for the description of Bcc recipients of


an e-mail?
a) The e-mail is automatically encrypted before being sent to Bcc recipients.
b) The text is deleted from the e-mail and an e-mail containing only the subject
is sent to the Bcc recipients.
c) The Bcc addresses are not revealed to other recipients of the e-mail.
d) The destination specified in Bcc is the notification destination when a
delivery error occurs.

4. When the Internet is accessed from an intranet, which of the following is the
most appropriate mechanism that can be used to relay access to the Internet, to
speed up access to it by caching Web content, and also to ensure security?

a) DMZ b) Firewall
c) Proxy d) Router

5. Which of the following is the most appropriate term that is used to indicate the
location of information on the Internet, and has the standardized format, such
as “http://www.ipa.go.jp/” ?

a) Address tag b) Domain name


c) Home page d) URL
6. Which of the following is an appropriate explanation of MIME used on the
Internet?
a) It is a language that is used to describe hypertext on the Internet.
b) It is a hypertext transmission protocol between client and server on the
Internet.
c) It is a method of address notation for uniquely identifying a resource on the
Internet.
d) It is a standard of exchanging multimedia data, such as audio or video, by e-
mail.

7. Which of the following is an appropriate explanation of an intranet?

a) It is an organization’s internal network that is built with Internet technology.


b) It is a company’s internal network that anyone outside a company can freely
connect to.
c) It is a network that is built in order to perform commercial electronic
transactions between multiple companies.
d) It is a network that is built without using wireless network, but with using
wired network only

8. Which of the following is an appropriate description concerning a cookie used


in the web?
a) It is a standard that can be used for formatting the layout of an HTML
document in detail.
b) It is a version of the HTTP protocol to which an encryption function is added
for private communications over the Internet.
c) It is a mechanism where a web server interacts with external programs to
create web pages dynamically.
d) It is a mechanism where information from a web server is temporarily saved
in a browser that accesses the web server.

9. Which of the following is an appropriate description of LTE in wireless


communications?
a) A wireless LAN communication method that enables devices to
communicate directly with each other without using any access point
b) A small-scale network that connects PCs and peripheral devices within a
range of several meters
c) A wireless communication standard for mobile phones to enable faster data
communication than 3G
d) A small base station system for mobile phones to be installed in households
and offices where it is difficult for radio waves to penetrate
10. Which of the following is the most appropriate description of a WAN?
a) A virtual private network that uses the Internet
b) A network that connects countries, rather than a network that connects
various regions within a country
c) A network that uses a network service from a network operator for
connecting geographically separated locations, for example, a head office and
its branch
d) A brand name that is granted only to devices where interconnectivity has
been confirmed, by the industrial association that promotes products that
support the IEEE 802.11 standard that is used in wireless LANs

11. Which of the following is a protocol that is used for synchronization of the
internal clock of a computer via a network with a server that holds a reference
clock?

a) FTP b) NTP c) POP d) SMTP

12. Which of the following is an appropriate description of online storage?


a) A virtual private network that is established via the Internet
b) A service that lends disk space for storing data via the Internet
c) Software that is distributed or sold via the Internet
d) A computer game that multiple users can simultaneously play via the
Internet

13. Which of the following ports does POP3 services use, by default?
A. 25
B. 110
C. 143
D. 443

14. Which of the following logical network topologies is used to provide a secure
connection across the Internet?
A. SSL
B. VPN
C. HTTPS
D. TLS
15. Logical addressing today is pretty much exclusively represented by
___________________.

A. MAC Address
B. IP address
C. URL address
D. ARP address

16. How many bytes is a MAC address?


A.128
B.32
C.48
D.64

17. Which WLAN IEEE specification allows up to 54Mbps at 2.4GHz?


A. A
B. B
C. G
D. N

18. Which protocol does Ping use?


A. TCP
B. ARP
C. ICMP
D. BootP

19. Which of the following mobile communication systems not only offers higher
communication speed than LTE, but also allows more devices to connect and
has less communication delay?
a) Block chain b) MVNO
c) 8K d) 5G

20. A DHCP server has been installed in a LAN. When a PC that automatically
acquires information from the DHCP server is to be connected to the LAN,
which of the following will be set in the PC?
a) IP address
b) Latest virus definition file
c) Address list of spam mail
d) Mail addresses assigned by the Internet service provider
21.

22. Which of the following is placed between an internal network and an external
network in order to prevent unauthorized access from the external network to the
internal network?
a) DHCP server b) Search engine
c) Switching hub d) Firewall

23. Mr. A sent an e-mail to the three (3) people Mr. P, Mr. Q, and Mr. R. He entered Mr.
P’s e-mail address in the To field, Mr. Q’s e-mail address in the CC field, and Mr. R’s
email address in the BCC field. Among the recipients of the e-mail Mr. P, Mr. Q, and
Mr. R, which of the following lists contains all and only the people who can know that
the email with the same content is sent to all three (3) people?
A. Mr. P, Mr. Q, Mr. R
B. Mr. P, Mr. R
C. Mr. Q, Mr. R
D. Mr. R

24. Which of the following is the unit of the data transmission speed in a network?
A. bps
B. fps
C. ppm
D. rpm
25. Which of the following is the technology that enables terminals connected to a shared
network such as the Internet to be used as if they are connected to a leased line by
ensuring security with encryption and authentication?
A. ADSL
B. ISDN
C. VPN
D. Wi-Fi

You might also like