Related Questions
What is the correct answer?
4
There are the following statements that are given below, which of them are correct Inverse ARP?
a) The Inverse ARP protocol is used to get the IP address from the MAC address.
b) It is the opposite of ARP.
c) The Inverse is used in only the Linux operating system.
d) All the above
Options:
What is the correct answer?
4
MTP stands for?
B. Message Transfer Protocol
C. Media Transfer Protocol
D. Media Transmission Protocol
What is the correct answer?
4
What is the full form of ETSI?
A. European Telegraph Standard Institute
B. European Telecommunications Standard Institute
C. Eastern Telephonic Standard Institute
D. European Telephonic Standard Institute
What is the correct answer?
4
HSDPA stands for?
A. Host Speed Downlink Packet Access
B. High Speed Downlink Packet Access
C. Host Speed Downloaded Packet Access
D. Host Speech Downlink Packet Access
What is the correct answer?
4
Which protocol is used between the SGSN and GGSN?
What is the correct answer?
4
In the RING topology data can travel in which direction?
What is the correct answer?
4
IPCONFIG stands for?
A. Internet Protocol Configuration
B. International Protocol Configuration
C. Internet Packet Configuration
D. Internet Process Configuration
What is the correct answer?
4
There are following statements that are given below, which of them are correct about SMTP?
a) It is an application layer protocol.
b) It is a connectionless protocol.
c) SMTP stands for Simple Mail Transfer Protocol.
d) SMTP is a text-based protocol.
Options:
What is the correct answer?
4
Which default port is used for MS SQL Server?
What is the correct answer?
4
Which of the following are examples of terminal equipment GPRS class C?
A. Embedded modules used in vending machines
What is the correct answer?
4
There are the following statements that are given below, what are the disadvantages of BUS topology in a computer network.
a) If the main cable is damaged then the complete network will not work.
b) Network disturbance occurs when we add or remove a device into a network.
c) Performance gets decreased when a new node is added to the network.
d) There is a security issue because every node in the network can access the data for other nodes.
Options:
What is the correct answer?
4
Which default port is used for MySql Server?
What is the correct answer?
4
Which layer of the OSI model is responsible for framing?
What is the correct answer?
4
Which layer of the OSI model is responsible for connection-oriented services?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about the OSI model?
A. The OSI model is a reference model that describes the network functionalities.
B. The OSI model is an implemented model that describes only network protocols.
C. The OSI model is an implemented model that describes only network topologies.
What is the correct answer?
4
What is the full form of SFTP?
A. Simple File Transfer Protocol
B. Short File Transfer Protocol
C. Secure File Transfer Protocol
D. Scheduled File Transfer Protocol
What is the correct answer?
4
Which of the following are correct VPN protocols?
a) PPTP
b) L2TP
c) SSTP
d) OpenVPN
Options:
What is the correct answer?
4
Which of the following network devices are operated at the physical layer of the OSI model?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about STAR network topologies in computer networks?
A. In the STAR topology all devices in a network are connected to a central device
B. In the STAR topology all devices in a network are connected to each other
C. In the STAR topology there is no need to required physical cable
What is the correct answer?
4
TFTP uses?
What is the correct answer?
4
Which layer of the OSI model is responsible for transmission mode?
What is the correct answer?
4
Which of the following is/are network device(s)?
What is the correct answer?
4
Which of the following options is used in the /etc/exports file to provide read-only access for shared files to the NFS clients?
What is the correct answer?
4
On which layer routers are operated?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about WiFi?
a) WiFi is used to create a wireless network that provides broadband coverage in the local area.
b) WiFi stands for Wireless Fiction.
c) It is based on the IEEE 802.11 standard.
d) We can create a wireless network in the limit area using WiFi.
Options:
What is the correct answer?
4
Which default port is used for SSL based IMAP?
What is the correct answer?
4
Which of the following commands are used in the FTP protocol?
a) PASS
b) MKD
c) CWD
d) PWD
Options:
What is the correct answer?
4
What are the elements of PKI?
a) Certificate management system
b) Certificate authority
c) Registration authority
d) SSL certificate
Options:
What is the correct answer?
4
In which year e-mail was invented?
What is the correct answer?
4
Which of the following are correct Certificate Authorities?
a) Symantec
b) DigiCert
c) GoDaddy
d) GlobalSign
Options: