Home
Current Affairs January 2024

What is the correct answer?

4

In which topology data is travel in a circular fashion from one node to another node in the network?

A. Star

B. Mesh

C. Bus

D. Ring

Correct Answer :

D. Ring


Related Questions

What is the correct answer?

4

In which year the telnet protocol was developed?

A. 1965

B. 1969

C. 1972

D. 1988

What is the correct answer?

4

Which of the following parameters are used for GPRS billing?
a) Amount of data transferred
b) Free of charge
c) Flat monthly rate
d) Quality of service
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following protocols are used as a replacement of RARP?
a) DNS
b) Inverse ARP
c) BOOTP
d) DHCP
Options:

A. A and B

B. C and D

C. A, B and D

D. A, B, and C

What is the correct answer?

4

TFTP uses?

A. TCP

B. UDP

C. Both

D. None

What is the correct answer?

4

Which of the following command is used to generate SSH keys in the Linux operating system?

A. keygen-ssh

B. ssh-keygen

C. ssh-key

D. ssk-genkey

What is the correct answer?

4

What are the correct components of WWW?
a) URL
b) HTTP
c) DNS
d) Web Server
Options:

A. C and D

B. A and B

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

DHCP stands for?

A. Double Host Committed Protocol

B. Dynamic Host Common Protocol

C. Dynamic Hyper Common Protocol

D. Dynamic Host Configuration Protocol

What is the correct answer?

4

There are the following options that are given below, which of them are the correct example of a simplex system?
a) Telephone
b) Walkie-Talkie
c) Radio
d) Television
Options:

A. Only A

B. Only B

C. A and B

D. C and D

What is the correct answer?

4

Which of the following are the components of the FTP Server?
a) Control process
b) Data transfer process
c) User Interface
d) None of the above
Options:

A. A and B

B. A and C

C. A, B, and C

D. D

What is the correct answer?

4

Which of the following correct problems in WiFi technology?
a) Backward Compatibility
b) Interoperability
c) Security issues
d) None of the above
Options:

A. A and B

B. A and C

C. A, B, and C

D. D

What is the correct answer?

4

PTP stands for?

A. Post Time Protocol

B. Post Transfer Protocol

C. Picture Transfer Protocol

D. Pixel Transfer Protocol

What is the correct answer?

4

URL stands for?

A. Universal Resource Locator

B. Universal Reserve Location

C. Ultimate Resource Locator

D. Uniform Resource Locator

What is the correct answer?

4

Which of the following is the correct bandwidth of the IEEE 802.11b standard?

A. 22 MHz

B. 20 MHz

C. 30 MHz

D. 25 MHz

What is the correct answer?

4

If N devices are connected in a MESH network, then how many ports are required by a node?

A. N

B. N-1

C. N+1

D. N+2

What is the correct answer?

4

Which of the following operating system supports telnet protocol?
a) Windows
b) Linux
c) Mac
d) All of the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about HTTP Messages?

A. HTTP messages are used to data CSS data from HTTP Server to the HTTP client.

B. HTTP messages are used to describe how data transferred between an HTTP client and an HTTP server.

C. Both of the above

D. None of the above

What is the correct answer?

4

Which protocol is used between the SGSN and GGSN?

A. KTP

B. NTP

C. LTP

D. GTP

What is the correct answer?

4

A host address in a URL can be?

A. An IP address

B. A Domain Name

C. Both

D. None

What is the correct answer?

4

What is the correct range of specific well-known ports, like 80 for HTTP in computer networks?

A. 0 1023

B. 1024 49151

C. 49152 65535

D. All the above

What is the correct answer?

4

Which of the following configuration file is used for SSH in the Linux operating system?

A. /etc/config/ssh.conf

B. /etc/ssh/sshd_config

C. /etc/ssh.config

D. /etc/sshfs.conf

What is the correct answer?

4

Which default port is used for Tomcat Shutdown?

A. 8080

B. 8005

C. 9082

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about VLAN?
a) VLAN is used to divide a physical network into multiple logical networks.
b) VLAN is used to break large broadcast domains into smaller broadcast domains.
c) VLAN stands for Virtual Local Area Network.
d) VLAN stands for Visual Local Area Network.
Options:

A. A and C

B. B and D

C. A, B, and C

D. A, B, and D

What is the correct answer?

4

Which of the following are the processes of the GPRS network?
a) Attach Process
b) Detach Process
c) Authentication process
d) PDP activation process
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below, what are the advantages of RING topology in a computer network.

A. In the RING topology, if we add a new device then its impact is minimal on performance

B. In the RING topology, data can travel from alternative routes to reach the destination

C. Fault identification is easy

D. All of the above

What is the correct answer?

4

The telnet protocol operates on which layer of the OSI model?

A. Network layer

B. Transport layer

C. Presentation layer

D. Application layer

What is the correct answer?

4

What are the correct types of SSL certificates?
a) Domain Validation
b) Extended Validation
c) Country Validation
d) Organization Validation
Options:

A. A and B

B. A, C, and D

C. A, B, and D

D. A, B, C, and, D

What is the correct answer?

4

Which of the following are the parts of VPN logs?
a) User activities
b) Devices used
c) IP addresses
d) Connection and disconnection timestamps
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

In which year TLS was introduced?

A. 1992

B. 1995

C. 1997

D. 1999

What is the correct answer?

4

Who invented WWW?

A. James Fowler

B. Tim berners lee

C. Mark Granovetter

D. Dirk Helbing

What is the correct answer?

4

There are the following methods that are given below, which of them are correct methods used in an HTTP request?
a) GET
b) POST
c) CONNECT
d) DELETE
Options:

A. A and B

B. A, B, and C

C. A, B, and D

D. A, B, C, and D