Related Questions
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about MESH network topologies in computer networks?
A. In the MESH topology all devices in a network are connected to a central device
B. In the MESH topology all devices in a network are connected to each other
C. In the MESH topology there is no need to required physical cable
What is the correct answer?
4
FTP stands for?
A. File Transport Protocol
B. File Transfer Protocol
C. Film Transfer Protocol
What is the correct answer?
4
Which FTP response code is used for Not logged in?
What is the correct answer?
4
What is the full form of GSM?
A. Global System for Mobile
B. Global Service for Mobile
C. General Service for Mobile
D. General System for Mobile
What is the correct answer?
4
What is the full form of QPSK?
A. Quality Phase Shift Keying
B. Quadric Phase Shift Keying
C. Quadrature Phase Shift Keying
D. Quad Phase Shift Keying
What is the correct answer?
4
RTS stands for?
What is the correct answer?
4
Which of the following number is assigned for IPv4 in the protocol type field of ARP message format?
What is the correct answer?
4
Which of the following countries does not legalize the VPN implementation?
a) China
b) UAE
c) Iraq
d) North Korea
Options:
What is the correct answer?
4
There are the following RFC numbers that are given below, which of them are related to TLS?
a) RFC 6066
b) RFC 6961
c) RFC 7961
d) RFC 8446
Options:
What is the correct answer?
4
In which year TLS was introduced?
What is the correct answer?
4
UDP stands for?
A. User specified Dialog Protocol
B. User Datagram Protocol
What is the correct answer?
4
There are the following statements that are given below, which of them are the disadvantages of FTP protocol?
a) All FTP providers do not provide encrypted transfer of files.
b) It does not allow simultaneous transfers with multiple receivers.
c) We cannot send a very large file due to the size limit.
d) FTP is not supported in Linux operating system.
Options:
What is the correct answer?
4
Which layer of the OSI model is responsible for framing?
What is the correct answer?
4
Which default port is used for Syslog Server?
What is the correct answer?
4
Which of the following error code is used for Internal Server Error in HTTP protocol?
What is the correct answer?
4
What are the core components of the email system?
a) Email client
b) Email server
c) Internet service provider
d) All the above
Options:
What is the correct answer?
4
There are following statements that are given below, which of them are correct about VLAN in computer networks?
A. VLAN is a virtual LAN, it is used to share only files within created LAN
B. VLAN is a virtual LAN which is used to divide a single broadcast domain into multiple broadcast domains
C. VLAN is a virtual LAN, it is used to share only hardware resources within created LAN
What is the correct answer?
4
Which layer of the OSI model is responsible for encryption and decryption?
What is the correct answer?
4
What do you understand about the physical layout in network topologies?
A. The physical layout that describes the physical placements of network devices
B. The physical layout describes the flow of data within the network
C. The physical layout that describes cables only used in the network
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about WebNFS?
a) The WebNFS is the extension of the NFS to access the file system over the internet.
b) This allows easy integration of NFS with a web browser.
c) This allows operations through the firewall.
d) All the above
Options:
What is the correct answer?
4
What is the full form of SSTP protocol?
A. Secure Socket Tunneling Protocol
B. Secure Service Tunneling Protocol
C. Secure Server Tunneling Protocol
D. Secure Saver Tunneling Protocol
What is the correct answer?
4
Which of the following configuration file is used to control on which port RPC and other services are listening in the Redhat Linux operating system?
What is the correct answer?
4
There are the following options that are given below, which of them are correct about URL encoding in HTTP?
A. URL encoding is used to replace some unsafe characters with specific characters in the URL.
B. URL encoding is used to encrypt data send in URL
C. URL encoding is used to encrypt complete URL
What is the correct answer?
4
Which protocol is used to provide functionalities of ARP for IPv6 addresses?
C. Neighbor Discovery Protocol
What is the correct answer?
4
What is the command is used to get an IP address from a URL in the windows operating system?
What is the correct answer?
4
Which of the following HTTP response code is used for permanent redirection?
What is the correct answer?
4
In which year ARP was defined first time in Request for Comment?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about SSL handshake?
a) SSL handshake is a process between the web browser and web servers used for verification.
b) SSL handshake begins before transferring actual data.
c) SSL handshake is used to verify the SSL certificate.
d) SSL handshake is used for webserver authentication.
Options:
What is the correct answer?
4
Which default port is used for DNS Service?
What is the correct answer?
4
Which of the following types of VLAN connections are supported by Switch?