Related Questions
What is the correct answer?
4
What are the correct protocols used by RING topology?
a) Fiber Distributed Data Interface
b) Token Ring
c) Metro Ring
d) Ticket Ring
Options:
What is the correct answer?
4
Which POP command is used to log off the session?
What is the correct answer?
4
ISDN stands for?
A. Integrated Service Digital Network
B. International Service Digital Network
C. Internet Service Digital Network
D. Intercommunication Service Digital Network
What is the correct answer?
4
UDP stands for?
A. User specified Dialog Protocol
B. User Datagram Protocol
What is the correct answer?
4
Which of the following are valid formats of SSL certificates?
a) PEM
b) DER
c) PKCS#7
d) PKCS#25
Options:
What is the correct answer?
4
Which FTP response code is used for Not logged in?
What is the correct answer?
4
Which of the following are not valid email client software?
a) Microsoft Outlook
b) Thunderbird
c) eM Client
d) Mailbird
Options:
D. All are valid email client software
What is the correct answer?
4
How many bits are used in IPv6 address?
What is the correct answer?
4
There are the following methods that are given below, which of them are correct methods used in an HTTP request?
a) GET
b) POST
c) CONNECT
d) DELETE
Options:
What is the correct answer?
4
How many bytes are reserved for target hardware address in ARP message format?
What is the correct answer?
4
In which year ARP was defined first time in Request for Comment?
What is the correct answer?
4
Which of the following are the states of MS in the GPRS system?
a) Idle state
b) Active state
c) Standby state
d) All of the above
Options:
What is the correct answer?
4
There are the following RFC numbers given below which is related HTTPS?
What is the correct answer?
4
Which of the following are the parts of VPN logs?
a) User activities
b) Devices used
c) IP addresses
d) Connection and disconnection timestamps
Options:
What is the correct answer?
4
Which of the following companies have its URL shortening services?
a) GoDaddy
b) Twitter
c) Google
d) All of the above
Options:
What is the correct answer?
4
Which of the following NFS command is used to lists the available shares at the remote server?
What is the correct answer?
4
Which of the following network devices are operated at the physical layer of the OSI model?
What is the correct answer?
4
Which default port is used for Jetty?
What is the correct answer?
4
Which of the following standard defines the format of an SSL certificate?
What is the correct answer?
4
There are the following statements that are given below, which of them is correct about the DELETE method of the HTTP request?
A. DELETE method is used to dismiss the HTTP request.
B. The DELETE method is used to remove unwanted data from the HTTP request.
C. The DELETE method is used to remove all current representations of resources.
D. DELETE method is used to remove all encryption information from the HTTP request.
What is the correct answer?
4
There are the following options that are given below which of them are correct layers used in WWW?
a) Cryptography
b) User Interface Applications
c) Identifiers
d) None of the above
Options:
What is the correct answer?
4
Which of the following types of VLAN connections are supported by Switch?
What is the correct answer?
4
VPN stands for?
A. Virtual Private Network
B. Visual Private Network
C. Visual Processing Network
D. Virtual Processing Network
What is the correct answer?
4
Which layer of the OSI model is responsible for end to end message delivery?
What is the correct answer?
4
What is the default port for DB2 database server?
What is the correct answer?
4
Which of the following are the processes of the GPRS network?
a) Attach Process
b) Detach Process
c) Authentication process
d) PDP activation process
Options:
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about the WiFi hotspot?
a) A WiFi hotspot is an area where devices like computers, mobile can access internet connection.
b) A WiFi hotspot can be created by installing a WiFi Access Point.
c) A WiFi access point can transmit signals in a limited area, know as the WiFi hotspot area.
d) All of the above
Options:
What is the correct answer?
4
There are the following options that are given below, which is not the type of flow control?
What is the correct answer?
4
There are the following options that are given below, which of them are correct parameters of HTTP?
a) HTTP version
b) URI
c) Space locator
d) Product tokens
Options:
What is the correct answer?
4
There are the following statements that are given below, which is the correct about internetworking?
A. Internetworking is the mechanism to connect multiple devices in a single network to share information only.
B. Internetworking is the mechanism to connect multiple devices in a single network to share resources only.
C. Internetworking is the mechanism to connect multiple networks to share data and resources.