Related Questions
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about VLAN?
a) VLAN is used to divide a physical network into multiple logical networks.
b) VLAN is used to break large broadcast domains into smaller broadcast domains.
c) VLAN stands for Virtual Local Area Network.
d) VLAN stands for Visual Local Area Network.
Options:
What is the correct answer?
4
What are the correct types of RING topology?
A. Unidirectional Ring topology
B. Bidirectional Ring topology
C. Collapsed Ring topology
What is the correct answer?
4
A host address in a URL can be?
What is the correct answer?
4
Which of the following options are used for communication between inter-switched VLANs?
a) 1Q
b) ISL
c) 5Q
d) UTP
Options:
What is the correct answer?
4
Which default port is used for Oracle Listener?
What is the correct answer?
4
Which default port is used for MS SQL Server?
What is the correct answer?
4
In which year HTTP 1.0 was introduced officially?
What is the correct answer?
4
SIM stands for?
A. Simple Interface Module
B. Socket Interface Module
C. Subscriber Identity Module
D. Server Identity Module
What is the correct answer?
4
Which default port is used for Tomcat Startup?
What is the correct answer?
4
The ARP protocol operates on which layer of the OSI model?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about HTTP?
a) HTTP stands for HyperText Transfer Protocol.
b) HTTP follows client/server architecture.
c) HTTP is used to transfer text, audio, image, etc.
d) The default port for HTTP is 80.
Options:
What is the correct answer?
4
Which of the following network devices are operated at the physical layer of the OSI model?
What is the correct answer?
4
In which year WWW was invented?
What is the correct answer?
4
There are following network devices that are given below, which device that operated on layer1 is used to enlarge the area of a LAN segment?
What is the correct answer?
4
Which layer of the OSI model is responsible for framing?
What is the correct answer?
4
Which of the following Certificate Authority provides a free DV SSL certificate?
What is the correct answer?
4
In which year HTTPS was invented?
What is the correct answer?
4
SMB stands for?
C. Simple Message Broadcast
D. Server Message Broadcast
What is the correct answer?
4
Which of the following is the correct frequency of the IEEE 802.11g standard?
What is the correct answer?
4
What is the full form of GSM?
A. Global System for Mobile
B. Global Service for Mobile
C. General Service for Mobile
D. General System for Mobile
What is the correct answer?
4
VHF stands for?
C. Virtual High Frequency
D. Virtual Host Frequency
What is the correct answer?
4
SSHFS stands for?
A. Secure Shell File Server
B. Secure Shell File Software
C. Secure Shell Film Server
D. Secure Shell File System
What is the correct answer?
4
A SSL certificate is also known as?
D. Cryptology Certificate
What is the correct answer?
4
What is the full form of RPC?
B. Remote Predefined Calls
D. Resources Procedure Call
What is the correct answer?
4
Which default port is used for Tomcat Shutdown?
What is the correct answer?
4
WiFi stands for?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about HYBRID topology in computer networks?
A. In the HYBRID topology all devices in a network are connected to a central device
B. The HYBRID topology is the combination of any two network topologies
C. In the HYBRID topology there is no need to required physical cable
What is the correct answer?
4
Which version of TLS removed the support for MD5 and SHA-224?
What is the correct answer?
4
What is the full form of BSC in GSM network?
A. Base Service Communication
B. Basic Service Communication
C. Base System Controller
D. Base Station Controller
What is the correct answer?
4
There are the following statements that are given below, which of them is correct about the DELETE method of the HTTP request?
A. DELETE method is used to dismiss the HTTP request.
B. The DELETE method is used to remove unwanted data from the HTTP request.
C. The DELETE method is used to remove all current representations of resources.
D. DELETE method is used to remove all encryption information from the HTTP request.