Home
Current Affairs January 2024

What is the correct answer?

4

How many layers used in the OSI model?

A. 5

B. 6

C. 7

D. 8

Correct Answer :

C. 7


Related Questions

What is the correct answer?

4

Which of the following interface is used between the SGSN and GGSN?

A. Gn interface

B. Um interface

C. Gb interface

D. None of the above

What is the correct answer?

4

Which of the following companies have its URL shortening services?
a) GoDaddy
b) Twitter
c) Google
d) All of the above
Options:

A. A and B

B. B and C

C. A and C

D. D

What is the correct answer?

4

In which year SSH was developed?

A. 1990

B. 1992

C. 1995

D. 1998

What is the correct answer?

4

There are the following options that are given below, which of them are part of the IEEE Ethernet frame header?
a) FCS field
b) Network addresses
c) Mac addresses
d) Network and Mac addresses
Options:

A. Only A

B. Only B

C. A and B

D. A and C

What is the correct answer?

4

Which of the following GPRS class of terminal equipment is used to manage both packet data and voice simultaneously?

A. Class A

B. Class B

C. Class C

D. Class D

What is the correct answer?

4

What is the maximum size limit of the file that can be transferred using the FTP protocol?

A. 1GB approx

B. 2GB approx

C. 4GB approx

D. 8GB approx

What is the correct answer?

4

Which of the following remote login protocols are supported by the PuTTY application?
a) SSH
b) telnet
c) Rlogin
d) VNC
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following protocol(s) is/are used by IEEE 802.11 standards?

A. CSMA/CA

B. CSMA/CD

C. Both

D. None

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about WiFi?
a) WiFi is used to create a wireless network that provides broadband coverage in the local area.
b) WiFi stands for Wireless Fiction.
c) It is based on the IEEE 802.11 standard.
d) We can create a wireless network in the limit area using WiFi.
Options:

A. A and B

B. A and C

C. A, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are the following options that are given below, which of them an IEEE standard is used in Frame tagging?

A. 802.11

B. 802.1Q

C. 802.3

D. 802.16

What is the correct answer?

4

SIM stands for?

A. Simple Interface Module

B. Socket Interface Module

C. Subscriber Identity Module

D. Server Identity Module

What is the correct answer?

4

HTTP works on which layer of the OSI model?

A. Network layer

B. Transport layer

C. Presentation layer

D. Application layer

What is the correct answer?

4

There are the following statements that are given below, what are the disadvantages of BUS topology in a computer network.
a) If the main cable is damaged then the complete network will not work.
b) Network disturbance occurs when we add or remove a device into a network.
c) Performance gets decreased when a new node is added to the network.
d) There is a security issue because every node in the network can access the data for other nodes.
Options:

A. A and B

B. B and C

C. C and D

D. A, B, C, and, D

What is the correct answer?

4

There are the following options that are given below, which of them are correct about URL encoding in HTTP?

A. URL encoding is used to replace some unsafe characters with specific characters in the URL.

B. URL encoding is used to encrypt data send in URL

C. URL encoding is used to encrypt complete URL

D. None of the above

What is the correct answer?

4

Which layer of the OSI model is responsible for compression?

A. Session Layer

B. Network Layer

C. Presentation Layer

D. Transport Layer

What is the correct answer?

4

A host address in a URL can be?

A. An IP address

B. A Domain Name

C. Both

D. None

What is the correct answer?

4

Which of the following HTTP response code is used for temporary redirection?

A. 301

B. 302

C. 303

D. 304

What is the correct answer?

4

HTTP stands for?

A. Hyper Ticks Transfer Protocol

B. Huge Time Transfer Protocol

C. Hyper Time Try Protocol

D. Hyper Text Transfer Protocol

What is the correct answer?

4

In which layer of OSI, Network topologies are used?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

There are the following options that are given below, which of them are correct types of computer networks?

A. WAN

B. LAN

C. MAN

D. All of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the advantages of HTTPS?
a) Data Integrity
b) Encryption based security
c) Search Engine Optimization
d) Antivirus protection
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are the advantages of FTP protocol?
a) Using FTP file transfer is very fast.
b) Using FTP, we can access the FTP server in a secure manner.
c) FTP is a very efficient protocol for transferring a file.
d) FTP provides back and forth movement.
Options:

A. A and B

B. B and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

Telnet stands for?

A. Teletype Network

B. Telephone Network

C. Telegram Network

D. Telegraph Network

What is the correct answer?

4

What are the correct types of SSL certificates?
a) Domain Validation
b) Extended Validation
c) Country Validation
d) Organization Validation
Options:

A. A and B

B. A, C, and D

C. A, B, and D

D. A, B, C, and, D

What is the correct answer?

4

There are the following statements that are given below, which of them is correct about the DELETE method of the HTTP request?

A. DELETE method is used to dismiss the HTTP request.

B. The DELETE method is used to remove unwanted data from the HTTP request.

C. The DELETE method is used to remove all current representations of resources.

D. DELETE method is used to remove all encryption information from the HTTP request.

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about TLS?
a) TLS stands for Transport Layer Security.
b) TLS is a security protocol that is used to implement secured communication between a web browser and a web server.
c) TLS is also used to implement secured communication for emails, messaging, etc.
d) SSL is the advanced version of TLS.
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which command is used to terminate the SMTP connection?

A. TERM

B. QUIT

C. EXIT

D. FINISH

What is the correct answer?

4

What the first inter-connected network is?

A. ARPANET

B. EXTRANET

C. INTRANET

D. None of the above

What is the correct answer?

4

ISDN stands for?

A. Integrated Service Digital Network

B. International Service Digital Network

C. Internet Service Digital Network

D. Intercommunication Service Digital Network

What is the correct answer?

4

Which of the following is used as a default SSH client in Windows 10?

A. sClient

B. sshClient

C. OpenSSH

D. OpenSSHClient