Related Questions
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about TLS?
a) TLS stands for Transport Layer Security.
b) TLS is a security protocol that is used to implement secured communication between a web browser and a web server.
c) TLS is also used to implement secured communication for emails, messaging, etc.
d) SSL is the advanced version of TLS.
Options:
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about UDP in networking?
a) UDP stands for User Data Protocol.
b) UDP is a network layer protocol.
c) UDP is stateless.
d) All of the above
Options:
What is the correct answer?
4
What is the full form of CSR related to the SSL Certificate?
A. Certificate Signing Request
B. Certificate Signal Response
C. Certificate Sample Resources
D. Certificate Sample Response
What is the correct answer?
4
What are the core components of the email system?
a) Email client
b) Email server
c) Internet service provider
d) All the above
Options:
What is the correct answer?
4
WML stands for?
B. Wisdom Markup Language
D. Wireless Markup Language
What is the correct answer?
4
Which of the following applications are used for remote login in the Linux operating system?
a) RealVNC
b) Remmina
c) NoMachine
d) TeamViewer
Options:
What is the correct answer?
4
In which year ARP was defined first time in Request for Comment?
What is the correct answer?
4
There are the following statements that are given below, what are the disadvantages of BUS topology in a computer network.
a) If the main cable is damaged then the complete network will not work.
b) Network disturbance occurs when we add or remove a device into a network.
c) Performance gets decreased when a new node is added to the network.
d) There is a security issue because every node in the network can access the data for other nodes.
Options:
What is the correct answer?
4
Which of the following protocol is not used for a VPN?
What is the correct answer?
4
What is the full form of TNFS?
A. Trivial Network File System
B. Triple Network File System
C. Trusted Network File System
D. Temporary Network File System
What is the correct answer?
4
In the RING topology data can travel in which direction?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about SSH protocol?
a) It is a remote login protocol, which is used to remotely log in using the command line.
b) SSH stands for Secure Shell.
c) Port 22 is used for SSH by default.
d) To use SSH protocol we required SSH server and SSH client programs.
Options:
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about remote login?
a) Remote login is a mechanism that is used to access the computer which is located in a different location using remote login protocols.
b) Using remote login we can access the computer through the command line only.
c) Now a day's remote login is very popular for remote support in almost all companies.
d) All the above
Options:
What is the correct answer?
4
How can we get a list of active ports in the Windows operating system?
A. Using netstate a command from the command line
B. Using netstat a command from the command line
C. Using getports -a command from the command line
What is the correct answer?
4
There are the following options that are given below, which of them are correct parameters of the UDP header?
a) Source Port number
b) Destination Port Number
c) Checksum
d) Flow control Flags
Options:
What is the correct answer?
4
What is the full form of VTP?
B. Visual Trunking Protocol
C. VLAN Trunking Protocol
D. Virtual Tagged Protocol
What is the correct answer?
4
If N devices are connected in a MESH network, then how many dedicated links are required to them?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about STAR network topologies in computer networks?
A. In the STAR topology all devices in a network are connected to a central device
B. In the STAR topology all devices in a network are connected to each other
C. In the STAR topology there is no need to required physical cable
What is the correct answer?
4
There are the following statements that are given below, which of them is correct about the DELETE method of the HTTP request?
A. DELETE method is used to dismiss the HTTP request.
B. The DELETE method is used to remove unwanted data from the HTTP request.
C. The DELETE method is used to remove all current representations of resources.
D. DELETE method is used to remove all encryption information from the HTTP request.
What is the correct answer?
4
There are the following options that are given below, which of them are correct about URL encoding in HTTP?
A. URL encoding is used to replace some unsafe characters with specific characters in the URL.
B. URL encoding is used to encrypt data send in URL
C. URL encoding is used to encrypt complete URL
What is the correct answer?
4
Which of the following is/are network device(s)?
What is the correct answer?
4
Which of the following are not correct types of network topologies in computer networks?
What is the correct answer?
4
There are the following options that are given below, which of them are correct functionalities of the router?
A. Internetwork communication
C. Selection of best route
What is the correct answer?
4
ISP stands for?
A. International Server Provider
B. International Service Provider
C. Internet Service Provider
D. Intranet Service Provider
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about SSL handshake?
a) SSL handshake is a process between the web browser and web servers used for verification.
b) SSL handshake begins before transferring actual data.
c) SSL handshake is used to verify the SSL certificate.
d) SSL handshake is used for webserver authentication.
Options:
What is the correct answer?
4
What is the full form of CSMA/CA?
A. Carrier Sense Media Access with Collision Avoidance
B. Carrier Sense Multiple Access with Collision Avoidance
C. Carrier Sense Minimum Access with Collision Avoidance
D. Carrier Sense Maximum Access with Collision Avoidance
What is the correct answer?
4
RARP stands for?
A. Reserve Address Resolution Protocol
B. Reverse Address Resolution Protocol
C. Revert Address Resolution Protocol
D. Responsive Address Resolution Protocol
What is the correct answer?
4
Which of the following is not part of the format of the SSL certificate?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about Native VLAN?
a) Native VLAN is used for backward compatibility with old devices that don’t support VLAN.
b) In the native VLAN, frames are not tagged when sent to the trunk links.
c) Native VLAN is used in mobile devices.
d) All of the above
Options:
What is the correct answer?
4
In which year FTP was developed?