Related Questions
What is the correct answer?
4
Which of the following are the main components of NFS architecture?
a) RPC
b) XDR
c) NFS procedures and Operations
d) All of the above
Options:
What is the correct answer?
4
Which of the following types of connections are used in FTP?
a) Control connection
b) Data connection
c) Database connection
d) All the above
Options:
What is the correct answer?
4
In which year OSI model was developed?
What is the correct answer?
4
What is the full form of NVT?
A. Network Viewer Terminal
B. Network Virtual Terminal
D. Network Viewer Telecast
What is the correct answer?
4
What is the full form of TNFS?
A. Trivial Network File System
B. Triple Network File System
C. Trusted Network File System
D. Temporary Network File System
What is the correct answer?
4
Which of the following command is used to generate SSH keys in the Linux operating system?
What is the correct answer?
4
In which year FTP was developed?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about TLS?
a) TLS stands for Transport Layer Security.
b) TLS is a security protocol that is used to implement secured communication between a web browser and a web server.
c) TLS is also used to implement secured communication for emails, messaging, etc.
d) SSL is the advanced version of TLS.
Options:
What is the correct answer?
4
What are the correct types of SSL certificates?
a) Domain Validation
b) Extended Validation
c) Country Validation
d) Organization Validation
Options:
What is the correct answer?
4
There are the following RFC numbers are given below, which of the following is related to UDP?
What is the correct answer?
4
Which layer of the OSI model is responsible for framing?
What is the correct answer?
4
Which of the following command is used for telnet in the Linux operating system?
What is the correct answer?
4
What are the correct sub-layers of the data link layer?
What is the correct answer?
4
Which protocol is used to provide functionalities of ARP for IPv6 addresses?
C. Neighbor Discovery Protocol
What is the correct answer?
4
Which of the following error code is used for Internal Server Error in HTTP protocol?
What is the correct answer?
4
There are the following RFC numbers that are given below, which of them are related to TLS?
a) RFC 6066
b) RFC 6961
c) RFC 7961
d) RFC 8446
Options:
What is the correct answer?
4
Which of the following options is used in the /etc/exports file to provide read-only access for shared files to the NFS clients?
What is the correct answer?
4
WML stands for?
B. Wisdom Markup Language
D. Wireless Markup Language
What is the correct answer?
4
Which default port is used for Tomcat Shutdown?
What is the correct answer?
4
The OSI model was developed by?
A. Advanced Research Project Agency
B. International Organization of Standardization
C. Internet Service Provider
What is the correct answer?
4
Which POP command is used to log off the session?
What is the correct answer?
4
HTTP stands for?
A. Hyper Ticks Transfer Protocol
B. Huge Time Transfer Protocol
C. Hyper Time Try Protocol
D. Hyper Text Transfer Protocol
What is the correct answer?
4
Which protocol is used between the SGSN and GGSN?
What is the correct answer?
4
There are following statements that are given below, which of them are correct about VLAN in computer networks?
A. VLAN is a virtual LAN, it is used to share only files within created LAN
B. VLAN is a virtual LAN which is used to divide a single broadcast domain into multiple broadcast domains
C. VLAN is a virtual LAN, it is used to share only hardware resources within created LAN
What is the correct answer?
4
What is the full form of UMTS?
A. Universal Mobile Telecommunication System
B. Unique Mobile Telecommunication System
C. Unique Mobile Transfer System
D. Universal Mobile Transfer System
What is the correct answer?
4
Who invented WWW?
What is the correct answer?
4
What is the full form of TKIP?
A. Temporal Key Integrity Protocol
B. Temporary Key Integration Protocol
C. Template Key Internal Protocol
D. Temporary Key Internal Protocol
What is the correct answer?
4
There are the following options that are given below, which of them are correct directives of HTTP Cache request?
a) no-cache
b) max-state
c) min-fresh
d) only-if-cached
Options:
What is the correct answer?
4
Which of the following protocol is used to broadcast MAC address to the entire network when a computer boots up?
What is the correct answer?
4
Which of the following number is assigned for IPv4 in the protocol type field of ARP message format?