Home
Current Affairs January 2024

What is the correct answer?

4

In which year, the SMTP was proposed the first time?

A. 1980

B. 1982

C. 1983

D. 1988

Correct Answer :

B. 1982


Related Questions

What is the correct answer?

4

What are the correct protocols used by RING topology?
a) Fiber Distributed Data Interface
b) Token Ring
c) Metro Ring
d) Ticket Ring
Options:

A. Only A

B. A, B, and C

C. B and D

D. Only B

What is the correct answer?

4

Which POP command is used to log off the session?

A. LOGOUT

B. LOGOFF

C. QUIT

D. EXIT

What is the correct answer?

4

ISDN stands for?

A. Integrated Service Digital Network

B. International Service Digital Network

C. Internet Service Digital Network

D. Intercommunication Service Digital Network

What is the correct answer?

4

UDP stands for?

A. User specified Dialog Protocol

B. User Datagram Protocol

C. User Dialog Protocol

D. Unsent Data Protocol

What is the correct answer?

4

Which of the following are valid formats of SSL certificates?
a) PEM
b) DER
c) PKCS#7
d) PKCS#25
Options:

A. A and B

B. A, C, and D

C. A, B, and C

D. A, B, C, and, D

What is the correct answer?

4

Which FTP response code is used for Not logged in?

A. 520

B. 530

C. 540

D. 550

What is the correct answer?

4

Which of the following are not valid email client software?
a) Microsoft Outlook
b) Thunderbird
c) eM Client
d) Mailbird
Options:

A. B

B. B and C

C. D

D. All are valid email client software

What is the correct answer?

4

How many bits are used in IPv6 address?

A. 32 bits

B. 64 bits

C. 128 bits

D. 256 bits

What is the correct answer?

4

There are the following methods that are given below, which of them are correct methods used in an HTTP request?
a) GET
b) POST
c) CONNECT
d) DELETE
Options:

A. A and B

B. A, B, and C

C. A, B, and D

D. A, B, C, and D

What is the correct answer?

4

How many bytes are reserved for target hardware address in ARP message format?

A. 4 bytes

B. 6 bytes

C. 8 bytes

D. 16 bytes

What is the correct answer?

4

In which year ARP was defined first time in Request for Comment?

A. 1982

B. 1985

C. 1988

D. 1990

What is the correct answer?

4

Which of the following are the states of MS in the GPRS system?
a) Idle state
b) Active state
c) Standby state
d) All of the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

There are the following RFC numbers given below which is related HTTPS?

A. RFC 2815

B. RFC 2818

C. RFC 2821

D. RFC 2854

What is the correct answer?

4

Which of the following are the parts of VPN logs?
a) User activities
b) Devices used
c) IP addresses
d) Connection and disconnection timestamps
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following companies have its URL shortening services?
a) GoDaddy
b) Twitter
c) Google
d) All of the above
Options:

A. A and B

B. B and C

C. A and C

D. D

What is the correct answer?

4

Which of the following NFS command is used to lists the available shares at the remote server?

A. showmount e

B. showmount d

C. exportfs u

D. exportfs v

What is the correct answer?

4

Which of the following network devices are operated at the physical layer of the OSI model?

A. Hub

B. Repeater

C. Modems

D. All the above

What is the correct answer?

4

Which default port is used for Jetty?

A. 8080

B. 8090

C. 9082

D. None of the above

What is the correct answer?

4

Which of the following standard defines the format of an SSL certificate?

A. X.506

B. X.507

C. X.508

D. X.509

What is the correct answer?

4

There are the following statements that are given below, which of them is correct about the DELETE method of the HTTP request?

A. DELETE method is used to dismiss the HTTP request.

B. The DELETE method is used to remove unwanted data from the HTTP request.

C. The DELETE method is used to remove all current representations of resources.

D. DELETE method is used to remove all encryption information from the HTTP request.

What is the correct answer?

4

There are the following options that are given below which of them are correct layers used in WWW?
a) Cryptography
b) User Interface Applications
c) Identifiers
d) None of the above
Options:

A. B and C

B. A and B

C. A, B, and C

D. D

What is the correct answer?

4

Which of the following types of VLAN connections are supported by Switch?

A. Access Link

B. Trunk Link

C. Both of the above

D. None of the above

What is the correct answer?

4

VPN stands for?

A. Virtual Private Network

B. Visual Private Network

C. Visual Processing Network

D. Virtual Processing Network

What is the correct answer?

4

Which layer of the OSI model is responsible for end to end message delivery?

A. Session Layer

B. Network Layer

C. Presentation Layer

D. Transport Layer

What is the correct answer?

4

What is the default port for DB2 database server?

A. 10000

B. 20000

C. 35000

D. 50000

What is the correct answer?

4

Which of the following are the processes of the GPRS network?
a) Attach Process
b) Detach Process
c) Authentication process
d) PDP activation process
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the WiFi hotspot?
a) A WiFi hotspot is an area where devices like computers, mobile can access internet connection.
b) A WiFi hotspot can be created by installing a WiFi Access Point.
c) A WiFi access point can transmit signals in a limited area, know as the WiFi hotspot area.
d) All of the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

There are the following options that are given below, which is not the type of flow control?

A. Congestion avoidance

B. Windowing

C. Cut-through

D. Buffering

What is the correct answer?

4

There are the following options that are given below, which of them are correct parameters of HTTP?
a) HTTP version
b) URI
c) Space locator
d) Product tokens
Options:

A. A and B

B. C and D

C. A, B, and D

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below, which is the correct about internetworking?

A. Internetworking is the mechanism to connect multiple devices in a single network to share information only.

B. Internetworking is the mechanism to connect multiple devices in a single network to share resources only.

C. Internetworking is the mechanism to connect multiple networks to share data and resources.

D. None of the above