wk1 mail Flashcards
The command “exinext” is used for what purpose?
Select one:
a. It prints the next message exim will attempt to deliver.
b. I don’t know.
c. It will attempt delivery of the next message that was sent from the provided email address.
d. It determines the next scheduled delivery attempt for an email address.
e. It provides a scrolling list of messages in the queue.
It determines the next scheduled delivery attempt for an email address.
Which command can be used to ensure you retrieve all related log entries of a particular string you are looking for, such as email address or message ID? Select one: a. exiqsumm b. exigrep c. exisum d. I don't know. e. exiwhat
exigrep
Match the message status indicators with their descriptions => == <= **
=> → The message was delivered successfully.,
== → The message delivery has been deferred.,
<= → The message successfully arrived at the server.,
** → A delivery failure has occurred.
Using the command "exim", which flags would you specify to check how exim is routing a given email address? Select one: a. -bt b. -t c. -tr d. I don't know. e. -er
-bt
Of the following mail protocols, which are handled directly, and supported, by the Dovecot software? Select one: a. LMTP b. POP3 c. IMAP d. I don't know. e. SMTP f. IMAP3 g. IMAPS h. POP2 i. FTP j. NTP k. LDAP
LMTP, IMAP, POP3, IMAPS
Of the following, which is the exim configuration file? Select one: a. /etc/exim.conf b. /etc/exim.config c. I don't know. d. /etc/exim/exim.conf e. /usr/local/etc/exim.conf
/etc/exim.conf
Of the following, which is the dovecot configuration file? Select one: a. /etc/dovecot/dovecot.conf b. /etc/dovecot.conf c. /etc/dovecot/dcot.conf d. I don't know. e. /etc/dcot.conf
/etc/dovecot/dovecot.conf
Exim stores its logs in which location? Select one: a. /usr/local/exim/logs/ b. /var/log/exim c. I don't know. d. /var/log/ e. /etc/exim/logs/
/var/log/
Exim is an example of what type of software? Select one: a. MTA b. I don't know. c. MDS d. MDA e. MDB
MTA
On which which port number do mail servers typically listen for non-secure connections? Select one: a. 25 b. I don't know. c. 587 d. 26 e. 465
25