Home
Current Affairs January 2024

What is the correct answer?

4

There are following statements that are given below, which of them are correct about network topology in computer networks?

A. A network topology is used to divide a single broadcast domain into multiple broadcast

B. A network topology is a way to arrange network devices to connect with each other

C. Both of the above

D. None of the above

Correct Answer :

B. A network topology is a way to arrange network devices to connect with each other


Related Questions

What is the correct answer?

4

Why Entity Tags are used in HTTP?
a) It is used to tag each item in the request created by the client.
b) It is used to compare two or more entities from the same requested resource.
c) It is used to download HTML documents.
d) It is used to download CSS documents.
Options:

A. Only A

B. Only B

C. A and B

D. C and D

What is the correct answer?

4

IP stands for?

A. Internet Protocol

B. International Protocol

C. Invert Protocol

D. Invoice Protocol

What is the correct answer?

4

Which of the following are correct commands used in the POP protocol?
a) STAT
b) LIST
c) DELETE
d) RSET
Options:

A. A and B

B. A and C

C. A, B, and D

D. D

What is the correct answer?

4

SMTP stands for?

A. Server Management Transfer Protocol

B. Server Mail Transfer Protocol

C. Secure Mail Transfer Protocol

D. Simple Mail Transfer Protocol

What is the correct answer?

4

TLS stands for?

A. Top Layer Security

B. Transfer Latest Security

C. Transport Layer Security

D. Top Level Security

What is the correct answer?

4

If N devices are connected in a MESH network, then how many dedicated links are required to them?

A. N

B. N+1

C. N(N+1)

D. N(N-1)/2

What is the correct answer?

4

Which of the following are correct Certificate Authorities?
a) Symantec
b) DigiCert
c) GoDaddy
d) GlobalSign
Options:

A. A and B

B. A, C, and D

C. A, B, and D

D. A, B, C, and, D

What is the correct answer?

4

In which topology data is travel in a circular fashion from one node to another node in the network?

A. Star

B. Mesh

C. Bus

D. Ring

What is the correct answer?

4

Which POP command is used to log off the session?

A. LOGOUT

B. LOGOFF

C. QUIT

D. EXIT

What is the correct answer?

4

Who was developed HTTP?

A. Jimmy Wales

B. Tim Berners-Lee

C. Larry Page

D. Alan Turing

What is the correct answer?

4

What is the full form of VTP?

A. VLAN Tagged Protocol

B. Visual Trunking Protocol

C. VLAN Trunking Protocol

D. Virtual Tagged Protocol

What is the correct answer?

4

Which layer of the OSI model is responsible for transmission mode?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

How many cables are required when N devices are connected with HUB in STAR topology?

A. N-1

B. N+1

C. N

D. N+2

What is the correct answer?

4

Which default port is used for Syslog Server?

A. 614

B. 514

C. 714

D. All the above

What is the correct answer?

4

UMTS stands for?

A. Universal Mobile Telecommunication System

B. Ultimate Mobile Telecommunication System

C. Unique Mobile Telecommunication System

D. Useful Mobile Telecommunication System

What is the correct answer?

4

There are the following statements that are given below, what are the advantages of RING topology in a computer network.

A. In the RING topology, if we add a new device then its impact is minimal on performance

B. In the RING topology, data can travel from alternative routes to reach the destination

C. Fault identification is easy

D. All of the above

What is the correct answer?

4

Which default port is used for Telnet?

A. 23

B. 14

C. 16

D. 22

What is the correct answer?

4

URL stands for?

A. Universal Resource Locator

B. Universal Reserve Location

C. Ultimate Resource Locator

D. Uniform Resource Locator

What is the correct answer?

4

Which of the following applications are used for remote login in the Linux operating system?
a) RealVNC
b) Remmina
c) NoMachine
d) TeamViewer
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

What is the full form of TNFS?

A. Trivial Network File System

B. Triple Network File System

C. Trusted Network File System

D. Temporary Network File System

What is the correct answer?

4

There are the following options that are given below, which of them can be done through UDP?
a) Trace Route
b) Time Stamp
c) Record Route
d) All the above
Options:

A. A and B

B. B and C

C. A and C

D. D

What is the correct answer?

4

There are the following statements that are given below, which is the correct about internetworking?

A. Internetworking is the mechanism to connect multiple devices in a single network to share information only.

B. Internetworking is the mechanism to connect multiple devices in a single network to share resources only.

C. Internetworking is the mechanism to connect multiple networks to share data and resources.

D. None of the above

What is the correct answer?

4

Which of the following configuration file is used for SSH in the Linux operating system?

A. /etc/config/ssh.conf

B. /etc/ssh/sshd_config

C. /etc/ssh.config

D. /etc/sshfs.conf

What is the correct answer?

4

Which of the following network devices are operated at the physical layer of the OSI model?

A. Hub

B. Repeater

C. Modems

D. All the above

What is the correct answer?

4

What is a socket in computer networks?

A. A socket is network topology to manage a network of devices

B. A socket is the combination of IP address and port

C. A socket is a network line configuration

D. None of the above

What is the correct answer?

4

SIM stands for?

A. Simple Interface Module

B. Socket Interface Module

C. Subscriber Identity Module

D. Server Identity Module

What is the correct answer?

4

There are the following methods that are given below, which of them are correct methods used in an HTTP request?
a) GET
b) POST
c) CONNECT
d) DELETE
Options:

A. A and B

B. A, B, and C

C. A, B, and D

D. A, B, C, and D

What is the correct answer?

4

What is the full form of TKIP?

A. Temporal Key Integrity Protocol

B. Temporary Key Integration Protocol

C. Template Key Internal Protocol

D. Temporary Key Internal Protocol

What is the correct answer?

4

Which default port is used for SSL based LDAP?

A. 636

B. 536

C. 436

D. 389

What is the correct answer?

4

What are the new features in TLS 1.1 over TLS1.0?
a) Protection against CBC attacks
b) Implicit Initialization Vector
c) Explicit Initialization Vector
d) Implemented SHA-256
Options:

A. A and B

B. A and C

C. A, B, and D

D. B, C, and D