Home
Current Affairs January 2024

What is the correct answer?

4

There are the following options that are given below, which of them are correct about URL encoding in HTTP?

A. URL encoding is used to replace some unsafe characters with specific characters in the URL.

B. URL encoding is used to encrypt data send in URL

C. URL encoding is used to encrypt complete URL

D. None of the above

Correct Answer :

A. URL encoding is used to replace some unsafe characters with specific characters in the URL.


Related Questions

What is the correct answer?

4

Who was developed HTTP?

A. Jimmy Wales

B. Tim Berners-Lee

C. Larry Page

D. Alan Turing

What is the correct answer?

4

ISP stands for?

A. International Server Provider

B. International Service Provider

C. Internet Service Provider

D. Intranet Service Provider

What is the correct answer?

4

What is the full form of PKI related to SSL?

A. Public Key Infrastructure

B. Private Key Infrastructure

C. Public Key Instructions

D. Private Key Instructions

What is the correct answer?

4

In which network topology, all hosts are connected to the central device?

A. Star

B. Ring

C. Hybrid

D. Mesh

What is the correct answer?

4

NetBIOS stands for?

A. Network Basic Input Output Server

B. Network Basic Input Output System

C. Network Basic Input Output Service

D. Next Basic Input Output Server

What is the correct answer?

4

What is the full form of SSTP protocol?

A. Secure Socket Tunneling Protocol

B. Secure Service Tunneling Protocol

C. Secure Server Tunneling Protocol

D. Secure Saver Tunneling Protocol

What is the correct answer?

4

Which default port is used for Redis Server?

A. 3379

B. 4379

C. 5379

D. 6379

What is the correct answer?

4

There are following statements that are given below, which statement correctly defines half duplex?

A. In a half-duplex system, during communication only devices can send information at a time.

B. In half a duplex system, during communication both devices can send or receive information simultaneously.

C. In a half-duplex system, during communication one device can send information and another device can receive.

D. None of the above.

What is the correct answer?

4

Which of the following error code is used for Bad Request in HTTP protocol?

A. 200

B. 300

C. 400

D. 500

What is the correct answer?

4

Which default port is used for SSL based IMAP?

A. 553

B. 443

C. 143

D. 993

What is the correct answer?

4

Who was invented email?

A. Ray Tomlinson

B. Robert E. Kahn

C. Shiva Ayyaduria

D. Vint Cerf

What is the correct answer?

4

The telnet protocol operates on which layer of the OSI model?

A. Network layer

B. Transport layer

C. Presentation layer

D. Application layer

What is the correct answer?

4

There are the following statements that are given below, which of them are the disadvantages of FTP protocol?
a) All FTP providers do not provide encrypted transfer of files.
b) It does not allow simultaneous transfers with multiple receivers.
c) We cannot send a very large file due to the size limit.
d) FTP is not supported in Linux operating system.
Options:

A. A and B

B. B and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the WiFi hotspot?
a) A WiFi hotspot is an area where devices like computers, mobile can access internet connection.
b) A WiFi hotspot can be created by installing a WiFi Access Point.
c) A WiFi access point can transmit signals in a limited area, know as the WiFi hotspot area.
d) All of the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which of the following address is used in Ethernet broadcast for ARP request?

A. 255.255.255.255

B. 255.255.255.254

C. FF:FF:FF:FF:FF:FF

D. 255.255.255.251

What is the correct answer?

4

There are the following options that are given below, which of them an IEEE standard is used in Frame tagging?

A. 802.11

B. 802.1Q

C. 802.3

D. 802.16

What is the correct answer?

4

How many bits are used for checksum in UDP header?

A. 4 bytes

B. 8 bytes

C. 16 bytes

D. 32 bytes

What is the correct answer?

4

What are the correct sub-layers of the data link layer?

A. Media Access Control

B. Logical Link Layer

C. Both of the above

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are the advantages of FTP protocol?
a) Using FTP file transfer is very fast.
b) Using FTP, we can access the FTP server in a secure manner.
c) FTP is a very efficient protocol for transferring a file.
d) FTP provides back and forth movement.
Options:

A. A and B

B. B and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

In which year WiFi was introduced?

A. 1998

B. 2000

C. 2001

D. 2002

What is the correct answer?

4

There are the following statements that are given below, which of them are correct OP code used in ARP message format?
a) The OP code is used to specify the type of ARP message.
b) The OP code is part of only the ARP request message.
c) The OP code 1 is used for ARP request.
d) The OP code 0 is used for ARP reply.
Options:

A. A and B

B. A and C

C. B and C

D. A, C, and D

What is the correct answer?

4

What is the maximum number for a port number in computer networks?

A. 1024

B. 32767

C. 65535

D. 65536

What is the correct answer?

4

Which of the following are correct commands used in the POP protocol?
a) STAT
b) LIST
c) DELETE
d) RSET
Options:

A. A and B

B. A and C

C. A, B, and D

D. D

What is the correct answer?

4

In which year e-mail was invented?

A. 1971

B. 1972

C. 1975

D. 1977

What is the correct answer?

4

Which of the following are the parts of the HTTP response?
a) Status
b) Message Body
c) The encryption key used for HTTP protocol security
d) Header fields for a response
Options:

A. A and B

B. B and D

C. B, C, and D

D. A, B, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about WebNFS?
a) The WebNFS is the extension of the NFS to access the file system over the internet.
b) This allows easy integration of NFS with a web browser.
c) This allows operations through the firewall.
d) All the above
Options:

A. A and B

B. A, and C

C. A, B, and C

D. D

What is the correct answer?

4

In which year FTP was developed?

A. 1987

B. 1971

C. 1988

D. 2001

What is the correct answer?

4

GSM stands for?

A. Global System for Mobile communication

B. Guest System for Mobile communication

C. Great System for Mobile communication

D. Global Server for Mobile communication

What is the correct answer?

4

What is the full form of GSM?

A. Global System for Mobile

B. Global Service for Mobile

C. General Service for Mobile

D. General System for Mobile

What is the correct answer?

4

There are the following options that are given below, which of them are correct request header fields?
a) Expect
b) Host
c) If-None-Range
d) If-None-Match
Options:

A. A and B

B. A, B, and C

C. A, B, and D

D. B, C, and D