Home
Current Affairs January 2024

What is the correct answer?

4

There are the following options that are given below, which of them are correct directives of HTTP Cache request?
a) no-cache
b) max-state
c) min-fresh
d) only-if-cached
Options:

A. A and B

B. A, B, C, and D

C. C and D

D. A, B, and C

Correct Answer :

B. A, B, C, and D


Related Questions

What is the correct answer?

4

Which of the following are application layer protocols?

A. TCP

B. UDP

C. Both of the above

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct advantages of VLAN?
a) Using VLAN, we can manage devices easily in the network.
b) We can create logical groups of devices on the basis of functions performed by them.
c) Using VLAN, we can reduce the size of broadcast domains.
d) VLAN allows us to add an additional layer of security.
Options:

A. A and C

B. B and D

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

There are the following options that are given below, which of them are the correct application of UDP to transmit data?
a) SNMP
b) DNS
c) TFTP
d) Routing Information protocol
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

A MAC address of the device is assigned by?

A. Network administrator

B. Manufacturing company

C. Network designer

D. All of them

What is the correct answer?

4

What is the full form of TFTP?

A. Transport File Transfer Protocol

B. Tree File Transfer Protocol

C. Trivial File Transfer Protocol

D. Trim File Transfer Protocol

What is the correct answer?

4

Which of the following are the types of HTTP header?
a) General header
b) Entity header
c) Request header
d) Response header
Options:

A. A, B, C and D

B. C and D

C. A, B, and C

D. A and B

What is the correct answer?

4

Which of the following are the parts of VPN logs?
a) User activities
b) Devices used
c) IP addresses
d) Connection and disconnection timestamps
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which layer of the OSI model is responsible for compression?

A. Session Layer

B. Network Layer

C. Presentation Layer

D. Transport Layer

What is the correct answer?

4

Which of the following commands are used for NFS?
a) exportfs -v
b) exportfs -u
c) showmount -d
d) exportnfs - k
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

DCCP stands for?

A. Datagram Congestion Control Protocol

B. Data Control Congestion Protocol

C. Datagram Control Congestion Protocol

D. Dynamic Congestion Control Protocol

What is the correct answer?

4

There are following options that are given below, where can we use full-duplex?
a) Switch to Switch
b) Host to Host
c) Hub to Hub
d) Switch to host
Options:

A. A, B and D

B. A and B only

C. A and D only

D. Only C

What is the correct answer?

4

In which area we can expend a LAN network?

A. We can expend a LAN network within the city

B. We can expend a LAN within an organization only

C. We can expend a LAN network within the country

D. We can expend a LAN network all over the world

What is the correct answer?

4

There are the following statements that are given below, which of them are correct ARP?
a) The ARP protocol is used to get destination MAC address from the destination IP address.
b) The ARP protocol is used to get the destination IP address from the destination MAC address.
c) The ARP stands for Address Resolution Protocol.
d) The ARP protocol works on the same network as well as connected networks.
Options:

A. A and C

B. A and B

C. A, C and D

D. B, C, and D

What is the correct answer?

4

FTP works on which layer of the OSI model?

A. Datalink layer

B. Network layer

C. Transport layer

D. Application layer

What is the correct answer?

4

Which utility command is used for FTP in the Linux operating system?

A. FTP

B. ftp

C. linuxftp

D. LinuxFtp

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about HTTP Caching?

A. HTTP caching is used to avoid sending HTTP requests many times for better performance.

B. HTTP caching is used to avoid sending HTTP full response many times for better performance.

C. Both of the above

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about HTTP?
a) HTTP stands for HyperText Transfer Protocol.
b) HTTP follows client/server architecture.
c) HTTP is used to transfer text, audio, image, etc.
d) The default port for HTTP is 80.
Options:

A. A and B

B. A and C

C. A, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below, which of them is correct about the DELETE method of the HTTP request?

A. DELETE method is used to dismiss the HTTP request.

B. The DELETE method is used to remove unwanted data from the HTTP request.

C. The DELETE method is used to remove all current representations of resources.

D. DELETE method is used to remove all encryption information from the HTTP request.

What is the correct answer?

4

Which default port is used for MS SQL Server?

A. 3506

B. 4406

C. 1306

D. 1433

What is the correct answer?

4

Which of the following address is used in Ethernet broadcast for ARP request?

A. 255.255.255.255

B. 255.255.255.254

C. FF:FF:FF:FF:FF:FF

D. 255.255.255.251

What is the correct answer?

4

On which layer routers are operated?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

Which of the following is/are not network device(s)?

A. Bridge

B. Repeater

C. Mesh

D. Hub

What is the correct answer?

4

In which year SSH was developed?

A. 1990

B. 1992

C. 1995

D. 1998

What is the correct answer?

4

What is the full form of NVT?

A. Network Viewer Terminal

B. Network Virtual Terminal

C. Next Virtual Terminal

D. Network Viewer Telecast

What is the correct answer?

4

Which of the following operating systems supports NFS?
a) Unix
b) Windows
c) Mac OS
d) Solaris
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

Which of the following standard defines the format of an SSL certificate?

A. X.506

B. X.507

C. X.508

D. X.509

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about SSL handshake?
a) SSL handshake is a process between the web browser and web servers used for verification.
b) SSL handshake begins before transferring actual data.
c) SSL handshake is used to verify the SSL certificate.
d) SSL handshake is used for webserver authentication.
Options:

A. A and B

B. A and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

How many ports can be used in network devices?

A. 1024

B. 32767

C. 65535

D. 65536

What is the correct answer?

4

What do you understand about logical layout in network topologies?

A. The logical layout describes the physical placements of network devices

B. The logical layout describes the flow of data within the network

C. The logical layout that describes cables only used in the network

D. All the above

What is the correct answer?

4

Which of the following are the parts of the HTTP response?
a) Status
b) Message Body
c) The encryption key used for HTTP protocol security
d) Header fields for a response
Options:

A. A and B

B. B and D

C. B, C, and D

D. A, B, and D