Related Questions
What is the correct answer?
4
SSH stands for?
What is the correct answer?
4
Who was invented HTTPS?
C. Netscape Communications
What is the correct answer?
4
Which default port is used for SSL based IMAP?
What is the correct answer?
4
There are the following statements that are given below, what are the advantages of BUS topology in a computer network.
a) We required less cabling in bus topology.
b) Easy to install
c) The communication in bus topology is faster than ring topology.
d) All the above
Options:
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about VLAN?
a) VLAN is used to divide a physical network into multiple logical networks.
b) VLAN is used to break large broadcast domains into smaller broadcast domains.
c) VLAN stands for Virtual Local Area Network.
d) VLAN stands for Visual Local Area Network.
Options:
What is the correct answer?
4
Which of the following NFS command is used to lists the available shares at the remote server?
What is the correct answer?
4
Which of the following are functions of the application layer?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about DNS in computer networks?
A. A DNS is a server which is used to convert web address or a URL into the corresponding IP address
B. A DNS is used to send or upload a data file to the server
C. A DNS is used to download the data file from the server
D. A DNS server is used to save data files into computer memory
What is the correct answer?
4
Why Entity Tags are used in HTTP?
a) It is used to tag each item in the request created by the client.
b) It is used to compare two or more entities from the same requested resource.
c) It is used to download HTML documents.
d) It is used to download CSS documents.
Options:
What is the correct answer?
4
There are the following options that are given below, which of them are the correct application of UDP to transmit data?
a) SNMP
b) DNS
c) TFTP
d) Routing Information protocol
Options:
What is the correct answer?
4
Which of the following RFC numbers are related to telnet?
a) RFC 860
b) RFC 861
c) RFC 885
d) RFC 1073
Options:
What is the correct answer?
4
TCP stands for?
A. Transport Control Protocol
B. Transfer Control Protocol
C. Transmission Control Protocol
D. Transfer Congestion Protocol
What is the correct answer?
4
Which of the following HTTP response code is used for temporary redirection?
What is the correct answer?
4
Which default port is used for Redis Server?
What is the correct answer?
4
Which POP command is used to open a connection?
What is the correct answer?
4
Which default port is used for MS SQL Server?
What is the correct answer?
4
The NPL network is operated by?
A. Next Physical Laboratory
B. National Physical Laboratory
C. Nexon Physical Laboratory
D. Nexon Physical Library
What is the correct answer?
4
What is the full form of SSTP protocol?
A. Secure Socket Tunneling Protocol
B. Secure Service Tunneling Protocol
C. Secure Server Tunneling Protocol
D. Secure Saver Tunneling Protocol
What is the correct answer?
4
There are the following statements that are given below, what are the disadvantages of BUS topology in a computer network.
a) If the main cable is damaged then the complete network will not work.
b) Network disturbance occurs when we add or remove a device into a network.
c) Performance gets decreased when a new node is added to the network.
d) There is a security issue because every node in the network can access the data for other nodes.
Options:
What is the correct answer?
4
PTP stands for?
B. Post Transfer Protocol
C. Picture Transfer Protocol
D. Pixel Transfer Protocol
What is the correct answer?
4
There are following options that are given below, where can we use full-duplex?
a) Switch to Switch
b) Host to Host
c) Hub to Hub
d) Switch to host
Options:
What is the correct answer?
4
How many bits are used in IPv6 address?
What is the correct answer?
4
In which year SSH was developed?
What is the correct answer?
4
What is the full form of CSMA/CA?
A. Carrier Sense Media Access with Collision Avoidance
B. Carrier Sense Multiple Access with Collision Avoidance
C. Carrier Sense Minimum Access with Collision Avoidance
D. Carrier Sense Maximum Access with Collision Avoidance
What is the correct answer?
4
Which of the following is/are unique identifiers for network device(s)?
What is the correct answer?
4
Which command is used to terminate the SMTP connection?
What is the correct answer?
4
Which of the following GPRS class of terminal equipment is used to manage both packet data and voice simultaneously?
What is the correct answer?
4
Which FTP response code is used for Not logged in?
What is the correct answer?
4
The telnet protocol operates on which layer of the OSI model?
What is the correct answer?
4
IPCONFIG stands for?
A. Internet Protocol Configuration
B. International Protocol Configuration
C. Internet Packet Configuration
D. Internet Process Configuration