Related Questions
What is the correct answer?
4
Which default port is used for Jenkins?
What is the correct answer?
4
Which of the following command is used for telnet in the Linux operating system?
What is the correct answer?
4
There are following statements that are given below, which of them are correct about IMAP?
a) The IMAP is used to manipulate email messaging without downloading it on a local machine.
b) It is used to access multiple mailboxes concurrently.
c) IMAP enables users to search for emails.
d) All the above
Options:
What is the correct answer?
4
Which default port is used for MongoDB?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about SSH protocol?
a) It is a remote login protocol, which is used to remotely log in using the command line.
b) SSH stands for Secure Shell.
c) Port 22 is used for SSH by default.
d) To use SSH protocol we required SSH server and SSH client programs.
Options:
What is the correct answer?
4
What is the full form of GSM?
A. Global System for Mobile
B. Global Service for Mobile
C. General Service for Mobile
D. General System for Mobile
What is the correct answer?
4
There are the following options that are given below, which of them are correct parameters of the UDP header?
a) Source Port number
b) Destination Port Number
c) Checksum
d) Flow control Flags
Options:
What is the correct answer?
4
On which layer switch and bridge are operated?
What is the correct answer?
4
What is the full form of ETSI?
A. European Telegraph Standard Institute
B. European Telecommunications Standard Institute
C. Eastern Telephonic Standard Institute
D. European Telephonic Standard Institute
What is the correct answer?
4
There are the following options that are given below, which is the correct example of a half-duplex system?
What is the correct answer?
4
How can we get a list of active ports in the Windows operating system?
A. Using netstate a command from the command line
B. Using netstat a command from the command line
C. Using getports -a command from the command line
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about STAR network topologies in computer networks?
A. In the STAR topology all devices in a network are connected to a central device
B. In the STAR topology all devices in a network are connected to each other
C. In the STAR topology there is no need to required physical cable
What is the correct answer?
4
Which layer of the OSI model is responsible for transmission mode?
What is the correct answer?
4
UDP operates on which layer of the OSI model?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about radio signals in WiFi communication?
A. Radio signals are transmitted by WiFi Antenna and received by WiFi receivers within the range of WiFI.
B. WiFi cards are used to read the WiFi signal and create connectivity between user and network.
What is the correct answer?
4
There are the following options that are given below, which of them are correct about URL encoding in HTTP?
A. URL encoding is used to replace some unsafe characters with specific characters in the URL.
B. URL encoding is used to encrypt data send in URL
C. URL encoding is used to encrypt complete URL
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about FTP?
a) FTP stands for File Transmission Protocol.
b) FTP is used to transfer files between clients and servers in the network.
c) FTP is a transport layer protocol.
d) FTP works with the command line as well as a graphical user interface.
Options:
What is the correct answer?
4
PTP stands for?
B. Post Transfer Protocol
C. Picture Transfer Protocol
D. Pixel Transfer Protocol
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about WebNFS?
a) The WebNFS is the extension of the NFS to access the file system over the internet.
b) This allows easy integration of NFS with a web browser.
c) This allows operations through the firewall.
d) All the above
Options:
What is the correct answer?
4
How can we send some data or information to the particular webpage using URL?
C. Using some special ports
D. Using the FTP protocol
What is the correct answer?
4
The OSI model was developed by?
A. Advanced Research Project Agency
B. International Organization of Standardization
C. Internet Service Provider
What is the correct answer?
4
DHCP stands for?
A. Double Host Committed Protocol
B. Dynamic Host Common Protocol
C. Dynamic Hyper Common Protocol
D. Dynamic Host Configuration Protocol
What is the correct answer?
4
Which of the following configuration file is used to control on which port RPC and other services are listening in the Redhat Linux operating system?
What is the correct answer?
4
What is ARP spoofing?
D. Type of network attack
What is the correct answer?
4
What is the correct range of specific well-known ports, like 80 for HTTP in computer networks?
What is the correct answer?
4
A host address in a URL can be?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct Inverse ARP?
a) The Inverse ARP protocol is used to get the IP address from the MAC address.
b) It is the opposite of ARP.
c) The Inverse is used in only the Linux operating system.
d) All the above
Options:
What is the correct answer?
4
What is the full form of CSMA/CA?
A. Carrier Sense Media Access with Collision Avoidance
B. Carrier Sense Multiple Access with Collision Avoidance
C. Carrier Sense Minimum Access with Collision Avoidance
D. Carrier Sense Maximum Access with Collision Avoidance
What is the correct answer?
4
Which google service is used for URL shortening?
What is the correct answer?
4
What is the default port for HTTP?