Last Updated on April 6, 2022 by Admin 3

Ch11 Email Configuration Exam

  1. The transfer of messages between machines and routing them to the correct destination is done by the Mail Transfer Agents (MTAs).

    True or False?

    • True 
    • False
  2. By default, while running the mail utility, commands can be entered when a ___________ prompt is shown. (choose two)

    • @
    • {
    • ?
    • %
    • &
  3. What happens if the user sysadmin invokes the mail command interface and there are no unread mail messages?

    • The mail program exits without any message 
    • The cursor is placed in the message body for creating a new message 
    • The message No mail for sysadmin is displayed 
    • Command returns an error code
  4. While accessing mail through the mailcommand interface, a user sees 5 new messages in his mailbox. Since the second message appears important, he would like to read that message first. Which mail command should be used? 

    • print 2 
    • display 2 
    • 2
    • show 2
  5. A user is accessing mail through the mail command interface. The command delete 3 will delete the second mail message because mail messages are counted starting with 0 instead of 1. True or False?

    • True 
    • False
  6. A user is replying to a mail message. After typing the response, which of the following key combinations will save and send the message?

    • Ctrl+S 
    • Ctrl+C 
    • Ctrl+A 
    • Ctrl+D
  7. A user is having trouble accessing the CDROM drive. He wants to send a message to the root user for help. Which of the following commands will create a new message that will be sent to the root user?

    • sendmail -n 
    • mail @root 
    • mail new_mesaage 
    • mail root
  8. The number of mail messages in the queue is increasing. Which of the following could cause this?

    • All choices are valid 
    • Configuration issue with local mail server 
    • Target mail server is down 
    • Problem with mail delivery
  9. Which of the following information is NOT available in the output from the mailq command?

    • Sender 
    • Out time 
    • Size 
    • Arrival time
  10. Which of the following options, when used with the mailq command, will re-send the messages in the queue?

    • -d
    • -s
    • -r
    • -q
  11. The behavior of the mailqcommand is identical to the sendmail -bp command for systems that are using the sendmail utility.

    True or False?

    • True 
    • False
  12. A mail alias can be created for which of the following? 

    • User name 
    • All of the above 
    • Email address 
    • Command
  13. The sendmail program refers to aliases defined in the _____________ file.

    • /etc/mail/aliases 
    • /etc/aliases 
    • /etc/mail.rc 
    • /etc/mail/aliases.conf
  14. The mail alias file contains the following alias: movie_buffs. Five users are associated with this alias. If a message is sent to movie_buffs, who will receive the message?

    • One of them will receive the message 
    • None, message will remain in the queue. 
    • All five members 
    • Only users who are logged in at that time
  15. The file /etc/mail/aliases.db is the binary format of the file /etc/mail/aliases. True or False?

    • True 
    • False
  16. The ___________ command creates the aliases.db file from the data provided in the aliases file.

    • newaliases 
    • aliases
  17. Deborah created a new alias and added it to the mail alias file. Next, she tried to use the alias through the sendmail command, but the new alias is not working. What is the most likely reason?

    • Maximum number of aliases is exceeded 
    • New alias was added with incorrect syntax 
    • New alias already existed 
    • The aliases.db file was not rebuilt using the newaliases command
  18. The behavior of the newaliases command is identical to the sendmail -bi command for systems that are using the sendmail utility.

    • True 
    • False
  19. A message was forwarded as per the .forward file found in the user’s home directory. What happens to the original message?

    • It goes back to the message queue 
    • Original message gets forwarded, no copy retained 
    • It is sent back to the sender 
    • A copy is retained in user’s mailbox
  20. Mike, a production support engineer, needs to temporarily leave the company on an emergency leave. In his absence Mike wants Francis, another support engineer, to receive the support messages. What should Mike do?

    • Pass on his login details to Francis so that he can access his email 
    • Create .forward file in his home directory and redirect messages 
    • Initiate the process for creating new production support account 
    • Delete his mailbox
  21. Simple Mail Transfer Protocol (SMTP) uses port ____________ for communication.

    • 23 
    • 22 
    • 21 
    • 25
  22. SMTP is the standard protocol for communication between email server and mail client. True or False?

    • True
    • False
  23. You have observed that your organization is not getting any incoming messages. What would be the most likely problem?

    • The administrator placed a .forward file in the root directory 
    • Domain name is not registered 
    • POP3 is not configured 
    • Port 25 is not open on the firewall
  24. The sendmail utility uses ______________ for translating hostname into their network addresses.

    • FTP 
    • SMS 
    • SSH 
    • DNS
  25. The ____________ file is used to configure the sendmail daemon.

    • /etc/rc.1 
    • /etc/mail.mail.c 
    • /etc/mail/sendmail.cf 
    • /etc/mail.conf
  26. Jackie wants to run sendmail as a daemon in the background. Which of the following options should she use with sendmail

    • -bp
    • -bd
    • -bi
    • -bD
  27. The postfix utility has several advantages over sendmail. Which of the following is not an advantage associated with postfix?

    • Ease of administration 
    • Single executable 
    • Modular design 
    • Enhanced security
  28. Which of the following statements is note true for exim?

    • exim has better security compared to sendmail
    • exim has three queues for storing messages temporarily 
    • exim implements access control lists 
    • exim has a single binary, similar to sendmail