Home
Current Affairs January 2024

What is the correct answer?

4

RTS stands for?

A. Real Time Streaming

B. Rest Trigger Storage

C. Rare Time Stream

D. Real Time Signal

Correct Answer :

A. Real Time Streaming


Related Questions

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about SSH protocol?
a) It is a remote login protocol, which is used to remotely log in using the command line.
b) SSH stands for Secure Shell.
c) Port 22 is used for SSH by default.
d) To use SSH protocol we required SSH server and SSH client programs.
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about radio signals in WiFi communication?

A. Radio signals are transmitted by WiFi Antenna and received by WiFi receivers within the range of WiFI.

B. WiFi cards are used to read the WiFi signal and create connectivity between user and network.

C. Both of the above

D. None of the above

What is the correct answer?

4

Which of the following options are used for communication between inter-switched VLANs?
a) 1Q
b) ISL
c) 5Q
d) UTP
Options:

A. A

B. B

C. A and B

D. C and D

What is the correct answer?

4

Who was developed FTP?

A. Bill gates

B. Abhay bhushan

C. H C Verma

D. Manindra agrawal

What is the correct answer?

4

In which year WiFi was introduced?

A. 1998

B. 2000

C. 2001

D. 2002

What is the correct answer?

4

Which default port is used for Jetty?

A. 8080

B. 8090

C. 9082

D. None of the above

What is the correct answer?

4

Which cryptography mechanism is used SSL?

A. Symmetric cryptography

B. Asymmetric cryptography

C. Both

D. None

What is the correct answer?

4

There are the following options that are given below, which of them are the correct application of UDP to transmit data?
a) SNMP
b) DNS
c) TFTP
d) Routing Information protocol
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

Which layer of the OSI model is responsible for routing?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

Which POP command is used to open a connection?

A. OPEN

B. LOGIN

C. CONNECT

D. ESTABLISH

What is the correct answer?

4

Which layer of the OSI model is responsible for bit synchronization?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

HTTP stands for?

A. Hyper Ticks Transfer Protocol

B. Huge Time Transfer Protocol

C. Hyper Time Try Protocol

D. Hyper Text Transfer Protocol

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about HTTP Caching?

A. HTTP caching is used to avoid sending HTTP requests many times for better performance.

B. HTTP caching is used to avoid sending HTTP full response many times for better performance.

C. Both of the above

D. None of the above

What is the correct answer?

4

Which of the following types of VLAN can be implemented?
a) Tagged VLAN
b) Untagged VLAN
c) Absolute VLAN
d) Pacific VLAN
Options:

A. A and B

B. C and D

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

Which default port is used for Syslog Server?

A. 614

B. 514

C. 714

D. All the above

What is the correct answer?

4

Which protocol is used between the SGSN and GGSN?

A. KTP

B. NTP

C. LTP

D. GTP

What is the correct answer?

4

Which of the following is not a type of computer network?

A. LAN

B. MAN

C. PAN

D. None of the above

What is the correct answer?

4

Which of the following HTTP response code is used for permanent redirection?

A. 301

B. 302

C. 303

D. 304

What is the correct answer?

4

Which default port is used for FTP?

A. 8090

B. 25

C. 21

D. 35

What is the correct answer?

4

What do you understand about the physical layout in network topologies?

A. The physical layout that describes the physical placements of network devices

B. The physical layout describes the flow of data within the network

C. The physical layout that describes cables only used in the network

D. All the above

What is the correct answer?

4

SSL stands for?

A. Simple Secure Layer

B. Secure Socket Layer

C. Server Socket Layer

D. Server Secure Layer

What is the correct answer?

4

Which of the following protocols are used for remote login?
a) telnet
b) ssh
c) ftp
d) scp
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which POP command is used to delete a message?

A. DELETE

B. DEL

C. DELE

D. REMOVE

What is the correct answer?

4

Why Entity Tags are used in HTTP?
a) It is used to tag each item in the request created by the client.
b) It is used to compare two or more entities from the same requested resource.
c) It is used to download HTML documents.
d) It is used to download CSS documents.
Options:

A. Only A

B. Only B

C. A and B

D. C and D

What is the correct answer?

4

What an HTTP message contains?
a) Message Header
b) Message Type
c) Message Body
d) Message Length
Options:

A. A, C, and D

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

How many layers used in the OSI model?

A. 5

B. 6

C. 7

D. 8

What is the correct answer?

4

WML stands for?

A. World Markup Language

B. Wisdom Markup Language

C. Worst Markup Language

D. Wireless Markup Language

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about NFS?
a) The NFS is used to share file system resources over the network.
b) NFS stands for Network File system.
c) NFS is a client/server protocol where File system resources at the server and accessed by the clients.
d) NFS is not a client/ server protocol.
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, and D

What is the correct answer?

4

There are following statements that are given below, which of them are correct about emails?
a) E-mail stands for Electronic Mail.
b) E-mail is used for sending and receiving text, images, and video files.
c) E-mail is also used for identity in the internet world.
d) E-mails are not secured enough for data transmission.
Options:

A. A and B

B. B and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

Which of the following are the parts of the URL?
a) Scheme
b) Host address
c) File path
d) None of the above
Options:

A. A and B

B. A and C

C. A, B, and C

D. D