Home
Current Affairs January 2024

What is the correct answer?

4

In which year the telnet protocol was developed?

A. 1965

B. 1969

C. 1972

D. 1988

Correct Answer :

B. 1969


Related Questions

What is the correct answer?

4

There are the following statements that are given below, which of them are correct ARP?
a) The ARP protocol is used to get destination MAC address from the destination IP address.
b) The ARP protocol is used to get the destination IP address from the destination MAC address.
c) The ARP stands for Address Resolution Protocol.
d) The ARP protocol works on the same network as well as connected networks.
Options:

A. A and C

B. A and B

C. A, C and D

D. B, C, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about NVT?
a) The NVT is used for remote login; it defines how data and commands should be sent in the network.
b) It acts as an interface and used to resolve dependencies for remote login between client and server system.
c) The NVT stands for Network Viewer Terminal.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which default port is used for NNTP?

A. 119

B. 120

C. 121

D. 122

What is the correct answer?

4

What Certificate Authorities do?

A. Certificate Authorities authenticate the identity of computers.

B. Certificate Authorities authenticate the identity of Individuals.

C. Both

D. None

What is the correct answer?

4

What is the full form of GSM?

A. Global System for Mobile

B. Global Service for Mobile

C. General Service for Mobile

D. General System for Mobile

What is the correct answer?

4

Which of the following are correct VPN protocols?
a) PPTP
b) L2TP
c) SSTP
d) OpenVPN
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following operating systems supports NFS?
a) Unix
b) Windows
c) Mac OS
d) Solaris
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

Which default port is used for MQ Listener?

A. 1515

B. 1414

C. 1616

D. 1717

What is the correct answer?

4

Which default port is used for SNMP?

A. 151

B. 161

C. 171

D. 181

What is the correct answer?

4

There are the following statements that are given below, which of them are the correct benefits of GPRS?
a) The data rate of GPRS is very high.
b) It is used to maintain constant data and voice communication.
c) The GPRS provides SMS and MMS services.
d) None of the above
Options:

A. A and B

B. B, C, and D

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

What are the correct types of SSL certificates?
a) Domain Validation
b) Extended Validation
c) Country Validation
d) Organization Validation
Options:

A. A and B

B. A, C, and D

C. A, B, and D

D. A, B, C, and, D

What is the correct answer?

4

What is the full form of LiFi?

A. Line Fidelity

B. Local Fidelity

C. Light Fidelity

D. Logical Fidelity

What is the correct answer?

4

How can we get a list of active ports in the Windows operating system?

A. Using netstate a command from the command line

B. Using netstat a command from the command line

C. Using getports -a command from the command line

D. None of the above

What is the correct answer?

4

Which of the following RFC numbers are related to NFS?
a) RFC 1094
b) RFC 1813
c) RFC 3530
d) RFC 5661
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

There are following statements that are given below, which of them are correct about IMAP?
a) The IMAP is used to manipulate email messaging without downloading it on a local machine.
b) It is used to access multiple mailboxes concurrently.
c) IMAP enables users to search for emails.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

There are the following statements that are given below, which of them is correct about the DELETE method of the HTTP request?

A. DELETE method is used to dismiss the HTTP request.

B. The DELETE method is used to remove unwanted data from the HTTP request.

C. The DELETE method is used to remove all current representations of resources.

D. DELETE method is used to remove all encryption information from the HTTP request.

What is the correct answer?

4

The telnet protocol operates on which layer of the OSI model?

A. Network layer

B. Transport layer

C. Presentation layer

D. Application layer

What is the correct answer?

4

Which of the following are the parts of the URL?
a) Scheme
b) Host address
c) File path
d) None of the above
Options:

A. A and B

B. A and C

C. A, B, and C

D. D

What is the correct answer?

4

In which year TLS was introduced?

A. 1992

B. 1995

C. 1997

D. 1999

What is the correct answer?

4

Which FTP response code is used for Not logged in?

A. 520

B. 530

C. 540

D. 550

What is the correct answer?

4

Which of the following security mechanism are used for the WiFi network?
a) WEP
b) WPA
c) WPA2
d) WPA3
Options:

A. A and C

B. A and B

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

Which of the following is responsible for allocating radio resources to the mobile calls?

A. Mobile Station

B. BSC

C. BS

D. None of the above

What is the correct answer?

4

What is the default IP address of the localhost?

A. 127.0.0.1

B. 192.168.10.1

C. 255.255.255.255

D. 255.255.255.0

What is the correct answer?

4

Where is CATENET used in internetworking?

A. The CATENET is not used in internetworking

B. The CATENET is a type of cable used in internetworking

C. The CATENET is used for packet switching communication in internetworking

D. None of the above

What is the correct answer?

4

FTP stands for?

A. File Transport Protocol

B. File Transfer Protocol

C. Film Transfer Protocol

D. File Trigger Protocol

What is the correct answer?

4

Which of the following RFC number is related to FTP?

A. RFC 114

B. RFC 220

C. RFC 225

D. RFC 235

What is the correct answer?

4

Who was developed NFS?

A. IBM

B. Sun Microsystems

C. Microsoft

D. Oracle

What is the correct answer?

4

Which of the following are correct Certificate Authorities?
a) Symantec
b) DigiCert
c) GoDaddy
d) GlobalSign
Options:

A. A and B

B. A, C, and D

C. A, B, and D

D. A, B, C, and, D

What is the correct answer?

4

There are the following options that are given below, which is the correct example of a half-duplex system?

A. Telephone

B. Walkie-Talkie

C. Radio

D. Television

What is the correct answer?

4

Which of the following are not functions of the data link layer?

A. Error Control

B. Routing

C. Flow Control

D. Access Control