Related Questions
What is the correct answer?
4
Which of the following are the parts of the HTTP response?
a) Status
b) Message Body
c) The encryption key used for HTTP protocol security
d) Header fields for a response
Options:
What is the correct answer?
4
What do you understand about the physical layout in network topologies?
A. The physical layout that describes the physical placements of network devices
B. The physical layout describes the flow of data within the network
C. The physical layout that describes cables only used in the network
What is the correct answer?
4
What is used for '$' for URL encoding?
What is the correct answer?
4
IMAP stands for?
A. Invoice Mail Access Protocol
B. Internet Mail Access Protocol
C. Internal Mail Access Protocol
D. International Mail Access Protocol
What is the correct answer?
4
What is the maximum size limit of the file that can be transferred using the FTP protocol?
What is the correct answer?
4
What are the new features in TLS 1.1 over TLS1.0?
a) Protection against CBC attacks
b) Implicit Initialization Vector
c) Explicit Initialization Vector
d) Implemented SHA-256
Options:
What is the correct answer?
4
What are the responsibilities of SGSN?
a) Registration of mobiles in the network.
b) SGSN is used for authenticating GPRS mobiles
c) It is used to store routing information of GPRS mobile
d) All of the above
Options:
What is the correct answer?
4
Which of the following GPRS class of terminal equipment is used to manage both packet data and voice simultaneously?
What is the correct answer?
4
Which default port is used for Microsoft RDP?
What is the correct answer?
4
Which of the following are examples of terminal equipment GPRS class C?
A. Embedded modules used in vending machines
What is the correct answer?
4
Which of the following are correct types of network topologies in computer networks?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about remote login?
a) Remote login is a mechanism that is used to access the computer which is located in a different location using remote login protocols.
b) Using remote login we can access the computer through the command line only.
c) Now a day's remote login is very popular for remote support in almost all companies.
d) All the above
Options:
What is the correct answer?
4
Which of following VPNs works on the Android operating system?
a) NordVPN
b) AndrVPN
c) Surfshark
d) ExpressVPN
Options:
What is the correct answer?
4
There are following options that are given below, where can we use full-duplex?
a) Switch to Switch
b) Host to Host
c) Hub to Hub
d) Switch to host
Options:
What is the correct answer?
4
Which layer of the OSI model is responsible for segmentation and reassembly?
What is the correct answer?
4
Which of the following RFC number is related to URL?
What is the correct answer?
4
Which default port is used for MS SQL Server?
What is the correct answer?
4
Which of the following are the components of the FTP Client?
a) Control process
b) Data transfer process
c) User Interface
d) None of the above
Options:
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about SSL handshake?
a) SSL handshake is a process between the web browser and web servers used for verification.
b) SSL handshake begins before transferring actual data.
c) SSL handshake is used to verify the SSL certificate.
d) SSL handshake is used for webserver authentication.
Options:
What is the correct answer?
4
ISDN stands for?
A. Integrated Service Digital Network
B. International Service Digital Network
C. Internet Service Digital Network
D. Intercommunication Service Digital Network
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about TLS?
a) TLS stands for Transport Layer Security.
b) TLS is a security protocol that is used to implement secured communication between a web browser and a web server.
c) TLS is also used to implement secured communication for emails, messaging, etc.
d) SSL is the advanced version of TLS.
Options:
What is the correct answer?
4
Which cryptography mechanism is used SSL?
A. Symmetric cryptography
B. Asymmetric cryptography
What is the correct answer?
4
There are the following options that are given below, which of them are correct directives of HTTP Cache request?
a) no-cache
b) max-state
c) min-fresh
d) only-if-cached
Options:
What is the correct answer?
4
In which year NFS was developed?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about VLAN?
a) VLAN is used to divide a physical network into multiple logical networks.
b) VLAN is used to break large broadcast domains into smaller broadcast domains.
c) VLAN stands for Virtual Local Area Network.
d) VLAN stands for Visual Local Area Network.
Options:
What is the correct answer?
4
Which default port is used for MySql Server?
What is the correct answer?
4
HTTPS stands for?
A. Hyper Text Transfer Protocol Secure
B. Hyper Text Transfer Protocol Saturn
C. Hyper Time Transfer Protocol Saturn
D. Hyper Time Transfer Protocol Secure
What is the correct answer?
4
There are the following options that are given below which of them are correct layers used in WWW?
a) Cryptography
b) User Interface Applications
c) Identifiers
d) None of the above
Options:
What is the correct answer?
4
A host address in a URL can be?
What is the correct answer?
4
In which year WWW was invented?