Home
Current Affairs January 2024

What is the correct answer?

4

There are following statements that are given below, which of them are correct about VLAN in computer networks?

A. VLAN is a virtual LAN, it is used to share only files within created LAN

B. VLAN is a virtual LAN which is used to divide a single broadcast domain into multiple broadcast domains

C. VLAN is a virtual LAN, it is used to share only hardware resources within created LAN

D. None of the above

Correct Answer :

B. VLAN is a virtual LAN which is used to divide a single broadcast domain into multiple broadcast domains


Related Questions

What is the correct answer?

4

SSH stands for?

A. Secure Shell

B. Server Shell

C. Simple Shell

D. Software Shell

What is the correct answer?

4

Who was invented HTTPS?

A. Oracle

B. Google

C. Netscape Communications

D. Microsoft

What is the correct answer?

4

Which default port is used for SSL based IMAP?

A. 553

B. 443

C. 143

D. 993

What is the correct answer?

4

There are the following statements that are given below, what are the advantages of BUS topology in a computer network.
a) We required less cabling in bus topology.
b) Easy to install
c) The communication in bus topology is faster than ring topology.
d) All the above
Options:

A. B and C

B. A and B

C. Only D

D. Only C

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about VLAN?
a) VLAN is used to divide a physical network into multiple logical networks.
b) VLAN is used to break large broadcast domains into smaller broadcast domains.
c) VLAN stands for Virtual Local Area Network.
d) VLAN stands for Visual Local Area Network.
Options:

A. A and C

B. B and D

C. A, B, and C

D. A, B, and D

What is the correct answer?

4

Which of the following NFS command is used to lists the available shares at the remote server?

A. showmount e

B. showmount d

C. exportfs u

D. exportfs v

What is the correct answer?

4

Which of the following are functions of the application layer?

A. Mail Services

B. File Transfer

C. Virtual terminals

D. All of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about DNS in computer networks?

A. A DNS is a server which is used to convert web address or a URL into the corresponding IP address

B. A DNS is used to send or upload a data file to the server

C. A DNS is used to download the data file from the server

D. A DNS server is used to save data files into computer memory

What is the correct answer?

4

Why Entity Tags are used in HTTP?
a) It is used to tag each item in the request created by the client.
b) It is used to compare two or more entities from the same requested resource.
c) It is used to download HTML documents.
d) It is used to download CSS documents.
Options:

A. Only A

B. Only B

C. A and B

D. C and D

What is the correct answer?

4

There are the following options that are given below, which of them are the correct application of UDP to transmit data?
a) SNMP
b) DNS
c) TFTP
d) Routing Information protocol
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

Which of the following RFC numbers are related to telnet?
a) RFC 860
b) RFC 861
c) RFC 885
d) RFC 1073
Options:

A. A and B

B. A and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

TCP stands for?

A. Transport Control Protocol

B. Transfer Control Protocol

C. Transmission Control Protocol

D. Transfer Congestion Protocol

What is the correct answer?

4

Which of the following HTTP response code is used for temporary redirection?

A. 301

B. 302

C. 303

D. 304

What is the correct answer?

4

Which default port is used for Redis Server?

A. 3379

B. 4379

C. 5379

D. 6379

What is the correct answer?

4

Which POP command is used to open a connection?

A. OPEN

B. LOGIN

C. CONNECT

D. ESTABLISH

What is the correct answer?

4

Which default port is used for MS SQL Server?

A. 3506

B. 4406

C. 1306

D. 1433

What is the correct answer?

4

The NPL network is operated by?

A. Next Physical Laboratory

B. National Physical Laboratory

C. Nexon Physical Laboratory

D. Nexon Physical Library

What is the correct answer?

4

What is the full form of SSTP protocol?

A. Secure Socket Tunneling Protocol

B. Secure Service Tunneling Protocol

C. Secure Server Tunneling Protocol

D. Secure Saver Tunneling Protocol

What is the correct answer?

4

There are the following statements that are given below, what are the disadvantages of BUS topology in a computer network.
a) If the main cable is damaged then the complete network will not work.
b) Network disturbance occurs when we add or remove a device into a network.
c) Performance gets decreased when a new node is added to the network.
d) There is a security issue because every node in the network can access the data for other nodes.
Options:

A. A and B

B. B and C

C. C and D

D. A, B, C, and, D

What is the correct answer?

4

PTP stands for?

A. Post Time Protocol

B. Post Transfer Protocol

C. Picture Transfer Protocol

D. Pixel Transfer Protocol

What is the correct answer?

4

There are following options that are given below, where can we use full-duplex?
a) Switch to Switch
b) Host to Host
c) Hub to Hub
d) Switch to host
Options:

A. A, B and D

B. A and B only

C. A and D only

D. Only C

What is the correct answer?

4

How many bits are used in IPv6 address?

A. 32 bits

B. 64 bits

C. 128 bits

D. 256 bits

What is the correct answer?

4

In which year SSH was developed?

A. 1990

B. 1992

C. 1995

D. 1998

What is the correct answer?

4

What is the full form of CSMA/CA?

A. Carrier Sense Media Access with Collision Avoidance

B. Carrier Sense Multiple Access with Collision Avoidance

C. Carrier Sense Minimum Access with Collision Avoidance

D. Carrier Sense Maximum Access with Collision Avoidance

What is the correct answer?

4

Which of the following is/are unique identifiers for network device(s)?

A. Hostname

B. IP address

C. Mac address

D. All the above

What is the correct answer?

4

Which command is used to terminate the SMTP connection?

A. TERM

B. QUIT

C. EXIT

D. FINISH

What is the correct answer?

4

Which of the following GPRS class of terminal equipment is used to manage both packet data and voice simultaneously?

A. Class A

B. Class B

C. Class C

D. Class D

What is the correct answer?

4

Which FTP response code is used for Not logged in?

A. 520

B. 530

C. 540

D. 550

What is the correct answer?

4

The telnet protocol operates on which layer of the OSI model?

A. Network layer

B. Transport layer

C. Presentation layer

D. Application layer

What is the correct answer?

4

IPCONFIG stands for?

A. Internet Protocol Configuration

B. International Protocol Configuration

C. Internet Packet Configuration

D. Internet Process Configuration