Home
Current Affairs January 2024

What is the correct answer?

4

In which year TLS was introduced?

A. 1992

B. 1995

C. 1997

D. 1999

Correct Answer :

D. 1999


Related Questions

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about TLS?
a) TLS stands for Transport Layer Security.
b) TLS is a security protocol that is used to implement secured communication between a web browser and a web server.
c) TLS is also used to implement secured communication for emails, messaging, etc.
d) SSL is the advanced version of TLS.
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about UDP in networking?
a) UDP stands for User Data Protocol.
b) UDP is a network layer protocol.
c) UDP is stateless.
d) All of the above
Options:

A. A and C

B. A and B

C. B and C

D. D

What is the correct answer?

4

What is the full form of CSR related to the SSL Certificate?

A. Certificate Signing Request

B. Certificate Signal Response

C. Certificate Sample Resources

D. Certificate Sample Response

What is the correct answer?

4

What are the core components of the email system?
a) Email client
b) Email server
c) Internet service provider
d) All the above
Options:

A. A and B

B. B and D

C. A and C

D. D

What is the correct answer?

4

WML stands for?

A. World Markup Language

B. Wisdom Markup Language

C. Worst Markup Language

D. Wireless Markup Language

What is the correct answer?

4

Which of the following applications are used for remote login in the Linux operating system?
a) RealVNC
b) Remmina
c) NoMachine
d) TeamViewer
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

In which year ARP was defined first time in Request for Comment?

A. 1982

B. 1985

C. 1988

D. 1990

What is the correct answer?

4

There are the following statements that are given below, what are the disadvantages of BUS topology in a computer network.
a) If the main cable is damaged then the complete network will not work.
b) Network disturbance occurs when we add or remove a device into a network.
c) Performance gets decreased when a new node is added to the network.
d) There is a security issue because every node in the network can access the data for other nodes.
Options:

A. A and B

B. B and C

C. C and D

D. A, B, C, and, D

What is the correct answer?

4

Which of the following protocol is not used for a VPN?

A. L2TP

B. IKEv2

C. PPTP

D. None of the above

What is the correct answer?

4

What is the full form of TNFS?

A. Trivial Network File System

B. Triple Network File System

C. Trusted Network File System

D. Temporary Network File System

What is the correct answer?

4

In the RING topology data can travel in which direction?

A. Clockwise

B. Anti-clock wise

C. In both direction

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about SSH protocol?
a) It is a remote login protocol, which is used to remotely log in using the command line.
b) SSH stands for Secure Shell.
c) Port 22 is used for SSH by default.
d) To use SSH protocol we required SSH server and SSH client programs.
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about remote login?
a) Remote login is a mechanism that is used to access the computer which is located in a different location using remote login protocols.
b) Using remote login we can access the computer through the command line only.
c) Now a day's remote login is very popular for remote support in almost all companies.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

How can we get a list of active ports in the Windows operating system?

A. Using netstate a command from the command line

B. Using netstat a command from the command line

C. Using getports -a command from the command line

D. None of the above

What is the correct answer?

4

There are the following options that are given below, which of them are correct parameters of the UDP header?
a) Source Port number
b) Destination Port Number
c) Checksum
d) Flow control Flags
Options:

A. A and B

B. A, B, and C

C. A, C, and D

D. A, B, C, and D

What is the correct answer?

4

What is the full form of VTP?

A. VLAN Tagged Protocol

B. Visual Trunking Protocol

C. VLAN Trunking Protocol

D. Virtual Tagged Protocol

What is the correct answer?

4

If N devices are connected in a MESH network, then how many dedicated links are required to them?

A. N

B. N+1

C. N(N+1)

D. N(N-1)/2

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about STAR network topologies in computer networks?

A. In the STAR topology all devices in a network are connected to a central device

B. In the STAR topology all devices in a network are connected to each other

C. In the STAR topology there is no need to required physical cable

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which of them is correct about the DELETE method of the HTTP request?

A. DELETE method is used to dismiss the HTTP request.

B. The DELETE method is used to remove unwanted data from the HTTP request.

C. The DELETE method is used to remove all current representations of resources.

D. DELETE method is used to remove all encryption information from the HTTP request.

What is the correct answer?

4

There are the following options that are given below, which of them are correct about URL encoding in HTTP?

A. URL encoding is used to replace some unsafe characters with specific characters in the URL.

B. URL encoding is used to encrypt data send in URL

C. URL encoding is used to encrypt complete URL

D. None of the above

What is the correct answer?

4

Which of the following is/are network device(s)?

A. Router

B. Hub

C. Switch

D. All the above

What is the correct answer?

4

Which of the following are not correct types of network topologies in computer networks?

A. Star

B. Ring

C. Hybrid

D. None of the above

What is the correct answer?

4

There are the following options that are given below, which of them are correct functionalities of the router?

A. Internetwork communication

B. Packet switching

C. Selection of best route

D. All of the above

What is the correct answer?

4

ISP stands for?

A. International Server Provider

B. International Service Provider

C. Internet Service Provider

D. Intranet Service Provider

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about SSL handshake?
a) SSL handshake is a process between the web browser and web servers used for verification.
b) SSL handshake begins before transferring actual data.
c) SSL handshake is used to verify the SSL certificate.
d) SSL handshake is used for webserver authentication.
Options:

A. A and B

B. A and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

What is the full form of CSMA/CA?

A. Carrier Sense Media Access with Collision Avoidance

B. Carrier Sense Multiple Access with Collision Avoidance

C. Carrier Sense Minimum Access with Collision Avoidance

D. Carrier Sense Maximum Access with Collision Avoidance

What is the correct answer?

4

RARP stands for?

A. Reserve Address Resolution Protocol

B. Reverse Address Resolution Protocol

C. Revert Address Resolution Protocol

D. Responsive Address Resolution Protocol

What is the correct answer?

4

Which of the following is not part of the format of the SSL certificate?

A. Signature algorithm

B. Public Key

C. Encrypted Text

D. Name of Issuer

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about Native VLAN?
a) Native VLAN is used for backward compatibility with old devices that don’t support VLAN.
b) In the native VLAN, frames are not tagged when sent to the trunk links.
c) Native VLAN is used in mobile devices.
d) All of the above
Options:

A. A and B

B. B and C

C. A and C

D. D

What is the correct answer?

4

In which year FTP was developed?

A. 1987

B. 1971

C. 1988

D. 2001