McGraw-Hill OnlineMcGraw-Hill Higher EducationLearning Center
Student Center | Instructor Center | Information Center | Home
Non-Chapter Glossary Terms
Non-Chapter Flashcards
Frequently Asked Questions
Student Message Board
Learning Objectives
Chapter Outline
Key Terms
Flashcards
Interactive Activities
Exercises
Multiple Choice Quiz
Feedback
Help Center


Inline Online
Inline/Online: Fundamentals of the Internet and the World Wide Web, 2/e
Raymond Greenlaw, Armstrong Atlantic State University
Ellen Hepp, The University of New Hampshire

Telnet and FTP

Telnet and FTP - Self-Assessment Quiz

The purpose of this quiz is to provide the student with a large number of supplemental exercises for Chapter 6. This quiz can be used to perform a self-evaluation. This quiz consists of twenty five multiple choice questions. Each multiple choice question has four possible answers.



1

Which of the following is true?
A)Telnet uses the telnet protocol.
B)Telnet uses the rlogin protocol.
C)Telnet and rlogin are identical.
D)Telnet and FTP have the same functionality.
2

Which of the following choices best describes the utility of Telnet?
A)Telnet allows you to transfer files between two computers.
B)Telnet allows you to connect and login to a remote computer.
C)Telnet allows you to network to the Internet.
D)Telnet can be used to retrieve images on the Web.
3

To Telnet to the machine hopper.unh.edu through a Web browser you should type which of the following in the location area?
A)telnet:hopper.unh.edu
B)Telnet:hopper.unh.edu
C)telnet:$\backslash$$\backslash$hopper.unh.edu
D)telnet://hopper.unh.edu
4

Choose the answer containing the most types of operating systems that have Telnet clients available to them.
A)Windows95 and Unix
B)MacOS and Windows98
C)WindowsNT, Unix, and MacOS
D)Windows95, Windows98, Unix, and MacOS
5

To display help about the rlogin command from a Unix system, you would enter which of the following?
A)help rlogin
B)man rlogin
C)manual rlogin
D)? rlogin
6

What is the correct syntax for user mary to rlogin to host bert?
A)rlogin -l bert mary
B)rlogin -1 bert mary
C)rlogin -1 mary bert
D)rlogin -l mary bert
7

Which of the following statements is true?
A)Telnet does not prompt you for a password most of the time.
B)Rlogin is quicker and more secure than Telnet.
C)Rlogin will echo your password on the screen
D)Rlogin will prompt you for a password.
8

FTP stands for
A)Find Transfer Protocol
B)Finder Transfer Protocol
C)File Transfer Protocol
D)File Transferring Protocol
9

Which of the following is not a mode of a standard graphical FTP client?
A)Auto
B)Binary
C)GIF
D)ASCII
10

Which mode should compressed files be transferred in?
A)Binary
B)ASCII
C)GIF
D)Plaintext
11

Which of the following is not a valid command to type in to the Unix ftp prompt?
A)?
B)get
C)put
D)pwt
12

Which Unix ftp command is used to list the directory contents of the remote machine?
A)lcd
B)cd
C)ls
D)dir
13

Which answer best describes the purpose of file compression?
A)Encrypt information.
B)Reduce storage space required for a file.
C)Hide information.
D)Recode the file into binary.
14

Which of the following is not a commonly used file compression utility?
A)PKZIP
B)gzip
C)compress
D)shrinker
15

Which of the following statements is false?
A)Any compressed file can be decompressed with any compression program.
B)There are files whose space can not be compressed.
C)Most compressed files are larger than the original.
D)Gzip works well with gunzip.
16

Anonymous file transfer is best used for which of the following?
A)Distributing freeware.
B)Distributing email.
C)File compression.
D)Letting people get secretive documents without revealing their identities.
17

Which of the following statements is false?
A)There are text-based FTP clients.
B)There are graphical-based FTP clients.
C)FTP can be launched through the location area of a browser.
D)By typing FTP to the Unix prompt, you can start the Unix file transfer protocol.
18

Which of the following is not a name for an item that could be a security threat to your computer?
A)Trojan horse
B)metacrawler
C)worm
D)virus
19

Which of the following is the best definition for virus?
A)A program that when run is able to replicate itself and then embed itself within another program.
B)A series of bits that are spread via phone lines.
C)A file that contains binary data.
D)A computer hacker who spams other users in an annoying fashion.
20

Which of the following is not something you would do to protect yourself from viruses?
A)Run antivirus software.
B)Download software from unknown sources.
C)Avoid pirated copies of software.
D)Backup your files regularly.
21

Anonymous FTP usually uses which of the following?
A)The user's e-mail address as the account name and the word guest as the password.
B)The user's e-mail address as the account name and the word anonymous as the password.
C)The word anonymous as the account name and the user's e-mail address as the password.
D)The word anonymous as the account name and the user's system password as the password.
22

Ways to copy a file from one computer to another include all but which of the following?
A)Archie.
B)E-mail the file as an attachment.
C)FTP.
D)Copy the file onto a diskette and then "walk" the diskette over to the other computer.
23

Which of the following statements is false?
A)Archie is a service that maintains databases containing listings of files from various file transfer sites.
B)One way to find a specific file involves sending e-mail to an Archie site.
C)Another way to find a specific file involves connecting to an Archie server via Telnet.
D)The name Archie is derived from "file architecture."
24

Which of the following statements is true?
A)UNIX viruses are rare because hackers are more interested in PCs and Macs.
B)Backing up your files regularly will not help in the event of a virus since the backed-up version will probably be infected as well.
C)Nearly all viruses are operating-system specific.
D)If infected by a virus, damage will occur immediately as it fills all available space on your hard drive.
25

Which of the following best describes a Trojan horse virus?
A)A stand-alone program that tries to gain access to computer systems via networks.
B)A virus that is transmitted via e-mail and is usually called "Good Times."
C)The Internet Worm which was created by Robert Morris.
D)A legitimate program for carrying out some useful function that has hidden code.