Related Questions
What is the correct answer?
4
There are the following statements that are given below, what are the disadvantages of BUS topology in a computer network.
a) If the main cable is damaged then the complete network will not work.
b) Network disturbance occurs when we add or remove a device into a network.
c) Performance gets decreased when a new node is added to the network.
d) There is a security issue because every node in the network can access the data for other nodes.
Options:
What is the correct answer?
4
In which year FTP was developed?
What is the correct answer?
4
On which layer routers are operated?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct Inverse ARP?
a) The Inverse ARP protocol is used to get the IP address from the MAC address.
b) It is the opposite of ARP.
c) The Inverse is used in only the Linux operating system.
d) All the above
Options:
What is the correct answer?
4
There are the following statements that are given below, which of them are correct statements about GPRS?
a) GPRS provides consistent IP services.
b) It provides wireless internet accesses over mobile phones.
c) GPRS uses the same infrastructure for different air interfaces.
d) GPRS is older technology; it does not use in the current scenario.
Options:
What is the correct answer?
4
A MAC is also known as?
D. Both physical address and hardware address
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about SSL handshake?
a) SSL handshake is a process between the web browser and web servers used for verification.
b) SSL handshake begins before transferring actual data.
c) SSL handshake is used to verify the SSL certificate.
d) SSL handshake is used for webserver authentication.
Options:
What is the correct answer?
4
Who was developed FTP?
What is the correct answer?
4
Which default port is used for SSL based LDAP?
What is the correct answer?
4
There are the following options that are given below, which of them are internetworking devices?
What is the correct answer?
4
How can we send some data or information to the particular webpage using URL?
C. Using some special ports
D. Using the FTP protocol
What is the correct answer?
4
There are the following RFC numbers are given below, which of the following is related to UDP?
What is the correct answer?
4
Which of the following services are used for NFS in the Redhat Linux operating system?
a) nfs
b) portmap
c) mountd
d) None of the above
Options:
What is the correct answer?
4
The URL shortening can be?
A. Temporary for limited time
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about MESH network topologies in computer networks?
A. In the MESH topology all devices in a network are connected to a central device
B. In the MESH topology all devices in a network are connected to each other
C. In the MESH topology there is no need to required physical cable
What is the correct answer?
4
Which layer of the OSI model is responsible for compression?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about HTTPS?
a) HTTPS is the extended version of HTTP.
b) HTTPS is used for secured communication between the web browser and web server.
c) HTTPS stands for HyperText Transfer Protocol Secure.
d) HTTPS also provides anti-virus security for the website.
Options:
What is the correct answer?
4
In which year NFS was developed?
What is the correct answer?
4
There are the following options that are given below, which is the correct purpose of segmentation with the bridge?
A. Addition of broadcast domains
B. Addition of bandwidth for users
C. Addition of broadcast users
What is the correct answer?
4
What is the full form of GSM?
A. Global System for Mobile
B. Global Service for Mobile
C. General Service for Mobile
D. General System for Mobile
What is the correct answer?
4
Which of the following are the parts of the URL?
a) Scheme
b) Host address
c) File path
d) None of the above
Options:
What is the correct answer?
4
There are the following RFC numbers that are given below, which of them are related to TLS?
a) RFC 6066
b) RFC 6961
c) RFC 7961
d) RFC 8446
Options:
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about VLAN Tagging?
a) The VLAN tagging is used to handle more than one VLAN on a port.
b) VLAN tagging can be performed by putting VLAN ID into the header to identify the network.
c) VLAN tagging is also known as VLAN trunking.
d) All the above
Options:
What is the correct answer?
4
Which of the following RFC number is related to URL?
What is the correct answer?
4
Which of the following protocol is used to broadcast MAC address to the entire network when a computer boots up?
What is the correct answer?
4
What is the full form of TNFS?
A. Trivial Network File System
B. Triple Network File System
C. Trusted Network File System
D. Temporary Network File System
What is the correct answer?
4
Which FTP command is used to send a request to display all files present in the directory?
What is the correct answer?
4
In which year HTTPS was invented?
What is the correct answer?
4
Who was developed HTTP?
What is the correct answer?
4
In which topology all devices are connected with a single backbone cable?