Related Questions
What is the correct answer?
4
In which year the telnet protocol was developed?
What is the correct answer?
4
Which of the following parameters are used for GPRS billing?
a) Amount of data transferred
b) Free of charge
c) Flat monthly rate
d) Quality of service
Options:
What is the correct answer?
4
Which of the following protocols are used as a replacement of RARP?
a) DNS
b) Inverse ARP
c) BOOTP
d) DHCP
Options:
What is the correct answer?
4
TFTP uses?
What is the correct answer?
4
Which of the following command is used to generate SSH keys in the Linux operating system?
What is the correct answer?
4
What are the correct components of WWW?
a) URL
b) HTTP
c) DNS
d) Web Server
Options:
What is the correct answer?
4
DHCP stands for?
A. Double Host Committed Protocol
B. Dynamic Host Common Protocol
C. Dynamic Hyper Common Protocol
D. Dynamic Host Configuration Protocol
What is the correct answer?
4
There are the following options that are given below, which of them are the correct example of a simplex system?
a) Telephone
b) Walkie-Talkie
c) Radio
d) Television
Options:
What is the correct answer?
4
Which of the following are the components of the FTP Server?
a) Control process
b) Data transfer process
c) User Interface
d) None of the above
Options:
What is the correct answer?
4
Which of the following correct problems in WiFi technology?
a) Backward Compatibility
b) Interoperability
c) Security issues
d) None of the above
Options:
What is the correct answer?
4
PTP stands for?
B. Post Transfer Protocol
C. Picture Transfer Protocol
D. Pixel Transfer Protocol
What is the correct answer?
4
URL stands for?
A. Universal Resource Locator
B. Universal Reserve Location
C. Ultimate Resource Locator
D. Uniform Resource Locator
What is the correct answer?
4
Which of the following is the correct bandwidth of the IEEE 802.11b standard?
What is the correct answer?
4
If N devices are connected in a MESH network, then how many ports are required by a node?
What is the correct answer?
4
Which of the following operating system supports telnet protocol?
a) Windows
b) Linux
c) Mac
d) All of the above
Options:
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about HTTP Messages?
A. HTTP messages are used to data CSS data from HTTP Server to the HTTP client.
B. HTTP messages are used to describe how data transferred between an HTTP client and an HTTP server.
What is the correct answer?
4
Which protocol is used between the SGSN and GGSN?
What is the correct answer?
4
A host address in a URL can be?
What is the correct answer?
4
What is the correct range of specific well-known ports, like 80 for HTTP in computer networks?
What is the correct answer?
4
Which of the following configuration file is used for SSH in the Linux operating system?
What is the correct answer?
4
Which default port is used for Tomcat Shutdown?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about VLAN?
a) VLAN is used to divide a physical network into multiple logical networks.
b) VLAN is used to break large broadcast domains into smaller broadcast domains.
c) VLAN stands for Virtual Local Area Network.
d) VLAN stands for Visual Local Area Network.
Options:
What is the correct answer?
4
Which of the following are the processes of the GPRS network?
a) Attach Process
b) Detach Process
c) Authentication process
d) PDP activation process
Options:
What is the correct answer?
4
There are the following statements that are given below, what are the advantages of RING topology in a computer network.
A. In the RING topology, if we add a new device then its impact is minimal on performance
B. In the RING topology, data can travel from alternative routes to reach the destination
C. Fault identification is easy
What is the correct answer?
4
The telnet protocol operates on which layer of the OSI model?
What is the correct answer?
4
What are the correct types of SSL certificates?
a) Domain Validation
b) Extended Validation
c) Country Validation
d) Organization Validation
Options:
What is the correct answer?
4
Which of the following are the parts of VPN logs?
a) User activities
b) Devices used
c) IP addresses
d) Connection and disconnection timestamps
Options:
What is the correct answer?
4
In which year TLS was introduced?
What is the correct answer?
4
Who invented WWW?
What is the correct answer?
4
There are the following methods that are given below, which of them are correct methods used in an HTTP request?
a) GET
b) POST
c) CONNECT
d) DELETE
Options: