Home
Current Affairs January 2024

What is the correct answer?

4

In the symmetric-key method of cryptography, which key is publicly known?

A. Encryption key only

B. Decryption key only

C. Both

D. None of the above

Correct Answer :

B. Decryption key only


Related Questions

What is the correct answer?

4

In Integrated services model, ________ corresponds to token bucket filter.

A. Bspec

B. Filter spec

C. Rspec

D. Tspec

What is the correct answer?

4

How many number of host/machine can be attached to a network using a class B address?

A. 65,536

B. 128

C. 256

D. 16,777,216

What is the correct answer?

4

Which of the following versions will replace IPv4 Internet layer?

A. IPv4.1

B. IPv5.1

C. IPv6

D. IPv5.2

What is the correct answer?

4

What is the IEEE specification for Ethernet?

A. 802.1

B. 802.2

C. 802.3

D. 802.4

What is the correct answer?

4

Which of the following is required to communicate between two computers?

A. Communications software

B. Protocol

C. Communication hardware

D. All of the above including access to transmission medium

What is the correct answer?

4

Which piece of equipment operates at both the data-link and network layers?

A. Hub

B. Bridge

C. Brouter

D. Router

What is the correct answer?

4

AppleTalk protocol configures hosts in zones on the network.

A. True.

B. False.

What is the correct answer?

4

Thick Ethernet cable uses what type of connector? Select all that apply.

A. RJ-45

B. AUI

C. DB-15

D. BNC

What is the correct answer?

4

UDP datagram has a header, which is of ________.

A. 16 bytes

B. 8-bytes

C. 32 bytes

D. 64 bytes

What is the correct answer?

4

In FTP, to execute a file transfer, the user begins by _________.

A. Navigating the directory structure

B. Connecting to a remote host

C. Listing files available for transfer.

D. Defining the transfer mode

What is the correct answer?

4

The key concern in the design of transmission system is -------------- and ---------------

A. data rate ,distance

B. speed, accuracy

C. accuracy, simplicity

D. distance , cost

What is the correct answer?

4

Class C network address class supports 65,534 hosts.

A. True.

B. False.

What is the correct answer?

4

Which of the following defines a family of standards for 100 Mbps fiber optic LANs that
provides the physical layer and media access control sub-layer of the data link layer, as
defined by the ISO/OSI Model?

A. Ethernet

B. IEEE 802

C. Fiber Distributed Data Interface (FDDI)

D. Point-to-Point Protocol (PPP)

What is the correct answer?

4

Which of the following can provide a backbone network of 600 meters in length without using repeaters?

A. 10BaseT

B. 100BaseT

C. 10Base5

D. 100BaseFX

What is the correct answer?

4

What are the subnet mask in dotted decimal notation for /20 networks?

A. 255.255.252.0

B. 255.255.255.0

C. 255.255.254.0

D. 255.255.240.0

What is the correct answer?

4

Which is the port used by HTTPS?

A. 123

B. 143

C. 69

D. 443

What is the correct answer?

4

FDDI operates on 100 Mbps.

A. True.

B. False.

What is the correct answer?

4

A time exceeded message is generated if ………………………………………………….

A. The round trip time between hosts is close to zero.

B. The Time-to Live field has a zero value.

C. Fragments of a message do not arrive within a set time

D. both b & c

What is the correct answer?

4

At which layer of the OSI model do FTP, SMTP, POP3, and HTTP function?

A. Physical

B. Network

C. Transport

D. Application

What is the correct answer?

4

Your Web server is also configured as an FTP server. What part of the data packet will tell the server which application the data is meant for?

A. Port

B. IP address

C. MAC address

D. Frame header

What is the correct answer?

4

_____________________ are set up to fulfill service ordering, service assurance, and
billing functions.

A. IPTV server

B. Users

C. Content servers

D. Complex Operation Support Systems (OSS)

What is the correct answer?

4

The special address 'THIS HOST' is referred to as

A. 0.0.0.0

B. 0.0.14.98

C. 127.0.0.127

D. 255.255.255.255

What is the correct answer?

4

Which of the following protocols use a topology table to install routes into the IP routing
table?

A. Open Shortest Path First (OSPF)

B. Enhanced Interior Gateway Routing Protocol (EIGRP)

C. Exterior Gateway Protocol (EGP)

D. Static routing protocols

What is the correct answer?

4

The packet transmit using standard Internet Protocol(IP) throughout the Internet by

A. Circuit switching

B. Packet switching

C. Message switching

D. None of the above.

What is the correct answer?

4

What is the address identified when socket is available at each end of TCP?

A. "<TCP, IP address, socket number>."

B. "<TCP, Host address, port address>."

C. "<TCP, IP address, port number>."

D. "<TCP, Network address, socket address>."

What is the correct answer?

4

What is the maximum length of twisted-pair cable before a signal booster is needed? Select all that apply.

A. 25 meters

B. 100 meters

C. 328 feet

D. 1000 feet

What is the correct answer?

4

Which of the following protocols were designed for terminal emulation to connect dissimilar systems?

A. Domain Name System

B. FTP

C. Telnet

D. Control Message Protocol

What is the correct answer?

4

Which directory service is used in Windows 2000 Server?

A. Active Directory

B. SAM

C. NDS

D. Bindery

What is the correct answer?

4

What is the default port for Telnet?

A. 23

B. 21

C. 25

D. 80

What is the correct answer?

4

_____________ command is used by the client to transfer the job across to the server.

A. Any upper layer protocol

B. User datagram protocol

C. Transmission Control protocol

D. Remote Shell protocol