Home
Current Affairs January 2024

What is the correct answer?

4

In which year SSH was developed?

A. 1990

B. 1992

C. 1995

D. 1998

Correct Answer :

C. 1995


Related Questions

What is the correct answer?

4

There are the following statements that are given below, which of them are correct types of the algorithms used in TLS protocol?
a) Key exchange algorithms
b) Bulk encryption algorithms
c) Digital Signature algorithms
d) None of the above
Options:

A. A and B

B. A and C

C. A, B, and C

D. D

What is the correct answer?

4

Which of the following number is assigned for IPv4 in the protocol type field of ARP message format?

A. 0x400

B. 0x800

C. 0x100

D. 0x200

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about SSL handshake?
a) SSL handshake is a process between the web browser and web servers used for verification.
b) SSL handshake begins before transferring actual data.
c) SSL handshake is used to verify the SSL certificate.
d) SSL handshake is used for webserver authentication.
Options:

A. A and B

B. A and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following are correct commands used in the POP protocol?
a) STAT
b) LIST
c) DELETE
d) RSET
Options:

A. A and B

B. A and C

C. A, B, and D

D. D

What is the correct answer?

4

Which of following VPNs supports torrenting?
a) NordVPN
b) Surfshark
c) EncVPN
d) ExpressVPN
Options:

A. A and B

B. A and C

C. A, B, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following protocols are used as a replacement of RARP?
a) DNS
b) Inverse ARP
c) BOOTP
d) DHCP
Options:

A. A and B

B. C and D

C. A, B and D

D. A, B, and C

What is the correct answer?

4

What is ARP spoofing?

A. ARP proxy request

B. RARP request

C. Inverse ARP request

D. Type of network attack

What is the correct answer?

4

IMAP stands for?

A. International Message Access Protocol

B. Internet Message Access Protocol

C. Invert Message Access Protocol

D. Internet Media Access Protocol

What is the correct answer?

4

Which of the following configuration file is used for SSH in the Linux operating system?

A. /etc/config/ssh.conf

B. /etc/ssh/sshd_config

C. /etc/ssh.config

D. /etc/sshfs.conf

What is the correct answer?

4

Which layer of the OSI model is responsible for end to end message delivery?

A. Session Layer

B. Network Layer

C. Presentation Layer

D. Transport Layer

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the OSI model?

A. The OSI model is a reference model that describes the network functionalities.

B. The OSI model is an implemented model that describes only network protocols.

C. The OSI model is an implemented model that describes only network topologies.

D. None of the above.

What is the correct answer?

4

Which protocol is used between the SGSN and GGSN?

A. KTP

B. NTP

C. LTP

D. GTP

What is the correct answer?

4

What is the full form of SSTP protocol?

A. Secure Socket Tunneling Protocol

B. Secure Service Tunneling Protocol

C. Secure Server Tunneling Protocol

D. Secure Saver Tunneling Protocol

What is the correct answer?

4

Which version of TLS removed the support for MD5 and SHA-224?

A. TLS 1.0

B. TLS 1.1

C. TLS 1.2

D. TLS 1.3

What is the correct answer?

4

Which of the following is/are unique identifiers for network device(s)?

A. Hostname

B. IP address

C. Mac address

D. All the above

What is the correct answer?

4

In which topology all devices are connected with a single backbone cable?

A. Star

B. Mesh

C. Bus

D. Ring

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about HYBRID topology in computer networks?

A. In the HYBRID topology all devices in a network are connected to a central device

B. The HYBRID topology is the combination of any two network topologies

C. In the HYBRID topology there is no need to required physical cable

D. None of the above

What is the correct answer?

4

Which of the following service is responsible for mounting and un-mounting of the file system?

A. portmap

B. rpc.mountd

C. mountfile

D. mtfile

What is the correct answer?

4

What is the default port for HTTP?

A. 80

B. 443

C. 15001

D. None of the above

What is the correct answer?

4

What are the elements of PKI?
a) Certificate management system
b) Certificate authority
c) Registration authority
d) SSL certificate
Options:

A. A and B

B. B, C, and D

C. A, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following error code is used for Bad Request in HTTP protocol?

A. 200

B. 300

C. 400

D. 500

What is the correct answer?

4

SFTP stands for?

A. Simple File Transfer Protocol

B. Safe File Transfer Protocol

C. Safety File Transfer Protocol

D. Secure File Transfer Protocol

What is the correct answer?

4

Which default port is used for MQ Listener?

A. 1515

B. 1414

C. 1616

D. 1717

What is the correct answer?

4

Telnet stands for?

A. Teletype Network

B. Telephone Network

C. Telegram Network

D. Telegraph Network

What is the correct answer?

4

UHF stands for?

A. Ultimate High Frequency

B. Universal High Frequency

C. Union High Frequency

D. Ultra High Frequency

What is the correct answer?

4

Which of the following standard defines the format of an SSL certificate?

A. X.506

B. X.507

C. X.508

D. X.509

What is the correct answer?

4

WML stands for?

A. World Markup Language

B. Wisdom Markup Language

C. Worst Markup Language

D. Wireless Markup Language

What is the correct answer?

4

What is the full form of TNFS?

A. Trivial Network File System

B. Triple Network File System

C. Trusted Network File System

D. Temporary Network File System

What is the correct answer?

4

What is the full form of CSR related to the SSL Certificate?

A. Certificate Signing Request

B. Certificate Signal Response

C. Certificate Sample Resources

D. Certificate Sample Response

What is the correct answer?

4

RTS stands for?

A. Real Time Streaming

B. Rest Trigger Storage

C. Rare Time Stream

D. Real Time Signal