Home
Current Affairs January 2024

What is the correct answer?

4

There are the following options that are given below, which of them are correct functionalities of the router?

A. Internetwork communication

B. Packet switching

C. Selection of best route

D. All of the above

Correct Answer :

D. All of the above


Related Questions

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about WiFi?
a) WiFi is used to create a wireless network that provides broadband coverage in the local area.
b) WiFi stands for Wireless Fiction.
c) It is based on the IEEE 802.11 standard.
d) We can create a wireless network in the limit area using WiFi.
Options:

A. A and B

B. A and C

C. A, C, and D

D. A, B, C, and D

What is the correct answer?

4

In which layer of OSI, Network topologies are used?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

There are the following statements that are given below, what are the advantages of MESH topology in a computer network.
a) It is the most robust network.
b) It is the most secure network.
c) Easy to configure.
d) All the above.
Options:

A. D

B. A and B

C. C

D. A, B, and C

What is the correct answer?

4

Which of the following RFC numbers are related to NFS?
a) RFC 1094
b) RFC 1813
c) RFC 3530
d) RFC 5661
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

In which year HTTP 1.0 was introduced officially?

A. 1991

B. 1995

C. 1996

D. 1998

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about Native VLAN?
a) Native VLAN is used for backward compatibility with old devices that don’t support VLAN.
b) In the native VLAN, frames are not tagged when sent to the trunk links.
c) Native VLAN is used in mobile devices.
d) All of the above
Options:

A. A and B

B. B and C

C. A and C

D. D

What is the correct answer?

4

There are the following statements that are given below which of them are correct about WWW?
a) WWW provides Cross-Platform for websites.
b) It provides Hyper Text Information that can be accessed easily.
c) It provides Open Standards and Open Source.
d) It provides a single interface form different service.
Options:

A. C and D

B. A and B

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

In which area we can expend a LAN network?

A. We can expend a LAN network within the city

B. We can expend a LAN within an organization only

C. We can expend a LAN network within the country

D. We can expend a LAN network all over the world

What is the correct answer?

4

Which POP command is used to open a connection?

A. OPEN

B. LOGIN

C. CONNECT

D. ESTABLISH

What is the correct answer?

4

A MAC address of the device is assigned by?

A. Network administrator

B. Manufacturing company

C. Network designer

D. All of them

What is the correct answer?

4

There are the following options that are given below, which of them are correct about URL encoding in HTTP?

A. URL encoding is used to replace some unsafe characters with specific characters in the URL.

B. URL encoding is used to encrypt data send in URL

C. URL encoding is used to encrypt complete URL

D. None of the above

What is the correct answer?

4

Which of the following configuration file is used for SSH in the Linux operating system?

A. /etc/config/ssh.conf

B. /etc/ssh/sshd_config

C. /etc/ssh.config

D. /etc/sshfs.conf

What is the correct answer?

4

What is the full form of NVT?

A. Network Viewer Terminal

B. Network Virtual Terminal

C. Next Virtual Terminal

D. Network Viewer Telecast

What is the correct answer?

4

NTP stands for?

A. Next Transfer Protocol

B. Network Time Protocol

C. New Time Protocol

D. Network Transfer Protocol

What is the correct answer?

4

There are the following statements that are given below which of them are correct about SPARQL?
a) It is a semantic query language that is used to perform database operations.
b) It manipulates data stored in RDF format.
c) It does not support the SELECT statement.
d) All the above
Options:

A. B and C

B. A and B

C. A and C

D. D

What is the correct answer?

4

How many bytes are reserved for target hardware address in ARP message format?

A. 4 bytes

B. 6 bytes

C. 8 bytes

D. 16 bytes

What is the correct answer?

4

What is the full form of QPSK?

A. Quality Phase Shift Keying

B. Quadric Phase Shift Keying

C. Quadrature Phase Shift Keying

D. Quad Phase Shift Keying

What is the correct answer?

4

Who was invented email?

A. Ray Tomlinson

B. Robert E. Kahn

C. Shiva Ayyaduria

D. Vint Cerf

What is the correct answer?

4

Which of the following GPRS class of terminal equipment is used to manage both packet data and voice simultaneously?

A. Class A

B. Class B

C. Class C

D. Class D

What is the correct answer?

4

In which year WiFi was introduced?

A. 1998

B. 2000

C. 2001

D. 2002

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about HTTP Caching?

A. HTTP caching is used to avoid sending HTTP requests many times for better performance.

B. HTTP caching is used to avoid sending HTTP full response many times for better performance.

C. Both of the above

D. None of the above

What is the correct answer?

4

What is the full form of SSTP protocol?

A. Secure Socket Tunneling Protocol

B. Secure Service Tunneling Protocol

C. Secure Server Tunneling Protocol

D. Secure Saver Tunneling Protocol

What is the correct answer?

4

There are the following statements that are given below, which of them are correct ARP?
a) The ARP protocol is used to get destination MAC address from the destination IP address.
b) The ARP protocol is used to get the destination IP address from the destination MAC address.
c) The ARP stands for Address Resolution Protocol.
d) The ARP protocol works on the same network as well as connected networks.
Options:

A. A and C

B. A and B

C. A, C and D

D. B, C, and D

What is the correct answer?

4

In which topology data is travel in a circular fashion from one node to another node in the network?

A. Star

B. Mesh

C. Bus

D. Ring

What is the correct answer?

4

What characters are normally used in the query string to define key and values?
a) %
b) ?
c) &
d) @
Options:

A. A and B

B. B and C

C. C and D

D. A, B, and C

What is the correct answer?

4

What is the full form of IEEE?

A. International Electronics and Electrical Engineers

B. International Electrical and Electronics Engineers

C. Institute of Electrical and Electronics Engineers

D. Institute of Electronics and Electrical Engineers

What is the correct answer?

4

Who was developed SSTP protocol?

A. Microsoft

B. IBM

C. CISCO

D. GOOGLE

What is the correct answer?

4

Which of the following are the parts of the URL?
a) Scheme
b) Host address
c) File path
d) None of the above
Options:

A. A and B

B. A and C

C. A, B, and C

D. D

What is the correct answer?

4

In which year the telnet protocol was developed?

A. 1965

B. 1969

C. 1972

D. 1988

What is the correct answer?

4

Which of the following are correct IEEE 802.11 network PHY standards?
a) 11a
b) 11b
c) 11p
d) 11y
Options:

A. A and B

B. A , B, and C

C. A, B, and D

D. A, B, C, and, D