Related Questions
What is the correct answer?
4
Which of the following are application layer protocols?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct advantages of VLAN?
a) Using VLAN, we can manage devices easily in the network.
b) We can create logical groups of devices on the basis of functions performed by them.
c) Using VLAN, we can reduce the size of broadcast domains.
d) VLAN allows us to add an additional layer of security.
Options:
What is the correct answer?
4
There are the following options that are given below, which of them are the correct application of UDP to transmit data?
a) SNMP
b) DNS
c) TFTP
d) Routing Information protocol
Options:
What is the correct answer?
4
A MAC address of the device is assigned by?
What is the correct answer?
4
What is the full form of TFTP?
A. Transport File Transfer Protocol
B. Tree File Transfer Protocol
C. Trivial File Transfer Protocol
D. Trim File Transfer Protocol
What is the correct answer?
4
Which of the following are the types of HTTP header?
a) General header
b) Entity header
c) Request header
d) Response header
Options:
What is the correct answer?
4
Which of the following are the parts of VPN logs?
a) User activities
b) Devices used
c) IP addresses
d) Connection and disconnection timestamps
Options:
What is the correct answer?
4
Which layer of the OSI model is responsible for compression?
What is the correct answer?
4
Which of the following commands are used for NFS?
a) exportfs -v
b) exportfs -u
c) showmount -d
d) exportnfs - k
Options:
What is the correct answer?
4
DCCP stands for?
A. Datagram Congestion Control Protocol
B. Data Control Congestion Protocol
C. Datagram Control Congestion Protocol
D. Dynamic Congestion Control Protocol
What is the correct answer?
4
There are following options that are given below, where can we use full-duplex?
a) Switch to Switch
b) Host to Host
c) Hub to Hub
d) Switch to host
Options:
What is the correct answer?
4
In which area we can expend a LAN network?
A. We can expend a LAN network within the city
B. We can expend a LAN within an organization only
C. We can expend a LAN network within the country
D. We can expend a LAN network all over the world
What is the correct answer?
4
There are the following statements that are given below, which of them are correct ARP?
a) The ARP protocol is used to get destination MAC address from the destination IP address.
b) The ARP protocol is used to get the destination IP address from the destination MAC address.
c) The ARP stands for Address Resolution Protocol.
d) The ARP protocol works on the same network as well as connected networks.
Options:
What is the correct answer?
4
FTP works on which layer of the OSI model?
What is the correct answer?
4
Which utility command is used for FTP in the Linux operating system?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about HTTP Caching?
A. HTTP caching is used to avoid sending HTTP requests many times for better performance.
B. HTTP caching is used to avoid sending HTTP full response many times for better performance.
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about HTTP?
a) HTTP stands for HyperText Transfer Protocol.
b) HTTP follows client/server architecture.
c) HTTP is used to transfer text, audio, image, etc.
d) The default port for HTTP is 80.
Options:
What is the correct answer?
4
There are the following statements that are given below, which of them is correct about the DELETE method of the HTTP request?
A. DELETE method is used to dismiss the HTTP request.
B. The DELETE method is used to remove unwanted data from the HTTP request.
C. The DELETE method is used to remove all current representations of resources.
D. DELETE method is used to remove all encryption information from the HTTP request.
What is the correct answer?
4
Which default port is used for MS SQL Server?
What is the correct answer?
4
Which of the following address is used in Ethernet broadcast for ARP request?
What is the correct answer?
4
On which layer routers are operated?
What is the correct answer?
4
Which of the following is/are not network device(s)?
What is the correct answer?
4
In which year SSH was developed?
What is the correct answer?
4
What is the full form of NVT?
A. Network Viewer Terminal
B. Network Virtual Terminal
D. Network Viewer Telecast
What is the correct answer?
4
Which of the following operating systems supports NFS?
a) Unix
b) Windows
c) Mac OS
d) Solaris
Options:
What is the correct answer?
4
Which of the following standard defines the format of an SSL certificate?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about SSL handshake?
a) SSL handshake is a process between the web browser and web servers used for verification.
b) SSL handshake begins before transferring actual data.
c) SSL handshake is used to verify the SSL certificate.
d) SSL handshake is used for webserver authentication.
Options:
What is the correct answer?
4
How many ports can be used in network devices?
What is the correct answer?
4
What do you understand about logical layout in network topologies?
A. The logical layout describes the physical placements of network devices
B. The logical layout describes the flow of data within the network
C. The logical layout that describes cables only used in the network
What is the correct answer?
4
Which of the following are the parts of the HTTP response?
a) Status
b) Message Body
c) The encryption key used for HTTP protocol security
d) Header fields for a response
Options: