Home
Current Affairs January 2024

What is the correct answer?

4

TCP stands for?

A. Transport Control Protocol

B. Transfer Control Protocol

C. Transmission Control Protocol

D. Transfer Congestion Protocol

Correct Answer :

C. Transmission Control Protocol


Related Questions

What is the correct answer?

4

What are the functions of the Certificate Management System?

A. It is used to store the certificate.

B. It is used to validate the certificate.

C. It is used to revoke certificates.

D. All of the above

What is the correct answer?

4

There are the following options that are given below, which is the correct example of a half-duplex system?

A. Telephone

B. Walkie-Talkie

C. Radio

D. Television

What is the correct answer?

4

What are the correct components of WWW?
a) URL
b) HTTP
c) DNS
d) Web Server
Options:

A. C and D

B. A and B

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

How many bytes are used in IPv4 addresses?

A. 4

B. 8

C. 16

D. 32

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about NFS?
a) The NFS is used to share file system resources over the network.
b) NFS stands for Network File system.
c) NFS is a client/server protocol where File system resources at the server and accessed by the clients.
d) NFS is not a client/ server protocol.
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, and D

What is the correct answer?

4

A SSL certificate is also known as?

A. Security Certificate

B. Privacy Certificate

C. Digital Certificate

D. Cryptology Certificate

What is the correct answer?

4

IMAP stands for?

A. Invoice Mail Access Protocol

B. Internet Mail Access Protocol

C. Internal Mail Access Protocol

D. International Mail Access Protocol

What is the correct answer?

4

Which of the following protocols are used as a replacement of RARP?
a) DNS
b) Inverse ARP
c) BOOTP
d) DHCP
Options:

A. A and B

B. C and D

C. A, B and D

D. A, B, and C

What is the correct answer?

4

Which default port is used for SNMP?

A. 151

B. 161

C. 171

D. 181

What is the correct answer?

4

What is the maximum number for a port number in computer networks?

A. 1024

B. 32767

C. 65535

D. 65536

What is the correct answer?

4

There are following statements that are given below, which of them are correct about POP?
a) POP stands for Post Office Protocol.
b) POP is used to support a single client.
c) POP supports offline access to messages.
d) All of the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

There are the following options that are given below, which of them are components of internetworking?

A. Media

B. Network devices

C. End devices

D. All of the above

What is the correct answer?

4

How many ports can be used in network devices?

A. 1024

B. 32767

C. 65535

D. 65536

What is the correct answer?

4

TFTP uses?

A. TCP

B. UDP

C. Both

D. None

What is the correct answer?

4

What is the default IP address of the localhost?

A. 127.0.0.1

B. 192.168.10.1

C. 255.255.255.255

D. 255.255.255.0

What is the correct answer?

4

WML stands for?

A. World Markup Language

B. Wisdom Markup Language

C. Worst Markup Language

D. Wireless Markup Language

What is the correct answer?

4

How can we get a list of active ports in the Windows operating system?

A. Using netstate a command from the command line

B. Using netstat a command from the command line

C. Using getports -a command from the command line

D. None of the above

What is the correct answer?

4

Which of the following NFS command is used to lists the available shares at the remote server?

A. showmount e

B. showmount d

C. exportfs u

D. exportfs v

What is the correct answer?

4

Which of the following are the types of HTTP header?
a) General header
b) Entity header
c) Request header
d) Response header
Options:

A. A, B, C and D

B. C and D

C. A, B, and C

D. A and B

What is the correct answer?

4

What the first inter-connected network is?

A. ARPANET

B. EXTRANET

C. INTRANET

D. None of the above

What is the correct answer?

4

SSH stands for?

A. Secure Shell

B. Server Shell

C. Simple Shell

D. Software Shell

What is the correct answer?

4

There are the following options that are given below, which of them are correct types of computer networks?

A. WAN

B. LAN

C. MAN

D. All of the above

What is the correct answer?

4

There are the following statements that are given below which of them are correct about WWW?
a) WWW provides Cross-Platform for websites.
b) It provides Hyper Text Information that can be accessed easily.
c) It provides Open Standards and Open Source.
d) It provides a single interface form different service.
Options:

A. C and D

B. A and B

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following correct problems in WiFi technology?
a) Backward Compatibility
b) Interoperability
c) Security issues
d) None of the above
Options:

A. A and B

B. A and C

C. A, B, and C

D. D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct Inverse ARP?
a) The Inverse ARP protocol is used to get the IP address from the MAC address.
b) It is the opposite of ARP.
c) The Inverse is used in only the Linux operating system.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

What is the full form of SFTP?

A. Simple File Transfer Protocol

B. Short File Transfer Protocol

C. Secure File Transfer Protocol

D. Scheduled File Transfer Protocol

What is the correct answer?

4

In which year TLS was introduced?

A. 1992

B. 1995

C. 1997

D. 1999

What is the correct answer?

4

What is the full form of CSMA/CA?

A. Carrier Sense Media Access with Collision Avoidance

B. Carrier Sense Multiple Access with Collision Avoidance

C. Carrier Sense Minimum Access with Collision Avoidance

D. Carrier Sense Maximum Access with Collision Avoidance

What is the correct answer?

4

A MAC address of the device is assigned by?

A. Network administrator

B. Manufacturing company

C. Network designer

D. All of them

What is the correct answer?

4

There are the following statements that are given below, what are the advantages of RING topology in a computer network.

A. In the RING topology, if we add a new device then its impact is minimal on performance

B. In the RING topology, data can travel from alternative routes to reach the destination

C. Fault identification is easy

D. All of the above