Home
Current Affairs January 2024

What is the correct answer?

4

In which area we can expend a WAN network?

A. We can expend a WAN network within the city

B. We can expend a WAN within an organization only

C. We can expend a WAN network within the country

D. We can expend a WAN network all over the world

Correct Answer :

D. We can expend a WAN network all over the world


Related Questions

What is the correct answer?

4

There are the following statements that are given below, which of them are correct Inverse ARP?
a) The Inverse ARP protocol is used to get the IP address from the MAC address.
b) It is the opposite of ARP.
c) The Inverse is used in only the Linux operating system.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

MTP stands for?

A. Message Type Protocol

B. Message Transfer Protocol

C. Media Transfer Protocol

D. Media Transmission Protocol

What is the correct answer?

4

What is the full form of ETSI?

A. European Telegraph Standard Institute

B. European Telecommunications Standard Institute

C. Eastern Telephonic Standard Institute

D. European Telephonic Standard Institute

What is the correct answer?

4

HSDPA stands for?

A. Host Speed Downlink Packet Access

B. High Speed Downlink Packet Access

C. Host Speed Downloaded Packet Access

D. Host Speech Downlink Packet Access

What is the correct answer?

4

Which protocol is used between the SGSN and GGSN?

A. KTP

B. NTP

C. LTP

D. GTP

What is the correct answer?

4

In the RING topology data can travel in which direction?

A. Clockwise

B. Anti-clock wise

C. In both direction

D. None of the above

What is the correct answer?

4

IPCONFIG stands for?

A. Internet Protocol Configuration

B. International Protocol Configuration

C. Internet Packet Configuration

D. Internet Process Configuration

What is the correct answer?

4

There are following statements that are given below, which of them are correct about SMTP?
a) It is an application layer protocol.
b) It is a connectionless protocol.
c) SMTP stands for Simple Mail Transfer Protocol.
d) SMTP is a text-based protocol.
Options:

A. A and B

B. A and C

C. A, C, and D

D. A, B, and C

What is the correct answer?

4

Which default port is used for MS SQL Server?

A. 3506

B. 4406

C. 1306

D. 1433

What is the correct answer?

4

Which of the following are examples of terminal equipment GPRS class C?

A. Embedded modules used in vending machines

B. GPRS PCM/CIA cards

C. Both

D. None

What is the correct answer?

4

There are the following statements that are given below, what are the disadvantages of BUS topology in a computer network.
a) If the main cable is damaged then the complete network will not work.
b) Network disturbance occurs when we add or remove a device into a network.
c) Performance gets decreased when a new node is added to the network.
d) There is a security issue because every node in the network can access the data for other nodes.
Options:

A. A and B

B. B and C

C. C and D

D. A, B, C, and, D

What is the correct answer?

4

Which default port is used for MySql Server?

A. 3506

B. 4406

C. 3306

D. None of the above

What is the correct answer?

4

Which layer of the OSI model is responsible for framing?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

Which layer of the OSI model is responsible for connection-oriented services?

A. Session Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the OSI model?

A. The OSI model is a reference model that describes the network functionalities.

B. The OSI model is an implemented model that describes only network protocols.

C. The OSI model is an implemented model that describes only network topologies.

D. None of the above.

What is the correct answer?

4

What is the full form of SFTP?

A. Simple File Transfer Protocol

B. Short File Transfer Protocol

C. Secure File Transfer Protocol

D. Scheduled File Transfer Protocol

What is the correct answer?

4

Which of the following are correct VPN protocols?
a) PPTP
b) L2TP
c) SSTP
d) OpenVPN
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following network devices are operated at the physical layer of the OSI model?

A. Hub

B. Repeater

C. Modems

D. All the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about STAR network topologies in computer networks?

A. In the STAR topology all devices in a network are connected to a central device

B. In the STAR topology all devices in a network are connected to each other

C. In the STAR topology there is no need to required physical cable

D. None of the above

What is the correct answer?

4

TFTP uses?

A. TCP

B. UDP

C. Both

D. None

What is the correct answer?

4

Which layer of the OSI model is responsible for transmission mode?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

Which of the following is/are network device(s)?

A. Router

B. Hub

C. Switch

D. All the above

What is the correct answer?

4

Which of the following options is used in the /etc/exports file to provide read-only access for shared files to the NFS clients?

A. ro

B. readonly

C. freadonly

D. None of the above

What is the correct answer?

4

On which layer routers are operated?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about WiFi?
a) WiFi is used to create a wireless network that provides broadband coverage in the local area.
b) WiFi stands for Wireless Fiction.
c) It is based on the IEEE 802.11 standard.
d) We can create a wireless network in the limit area using WiFi.
Options:

A. A and B

B. A and C

C. A, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which default port is used for SSL based IMAP?

A. 553

B. 443

C. 143

D. 993

What is the correct answer?

4

Which of the following commands are used in the FTP protocol?
a) PASS
b) MKD
c) CWD
d) PWD
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

What are the elements of PKI?
a) Certificate management system
b) Certificate authority
c) Registration authority
d) SSL certificate
Options:

A. A and B

B. B, C, and D

C. A, C, and D

D. A, B, C, and D

What is the correct answer?

4

In which year e-mail was invented?

A. 1971

B. 1972

C. 1975

D. 1977

What is the correct answer?

4

Which of the following are correct Certificate Authorities?
a) Symantec
b) DigiCert
c) GoDaddy
d) GlobalSign
Options:

A. A and B

B. A, C, and D

C. A, B, and D

D. A, B, C, and, D