Home
Current Affairs January 2024

What is the correct answer?

4

There are the following RFC numbers that are given below, which of them are related to TLS?
a) RFC 6066
b) RFC 6961
c) RFC 7961
d) RFC 8446
Options:

A. A and B

B. A, B, and C

C. A, B, and D

D. A, B, C, and D

Correct Answer :

C. A, B, and D


Related Questions

What is the correct answer?

4

Which of the following are application layer protocols?

A. TCP

B. UDP

C. Both of the above

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about STAR network topologies in computer networks?

A. In the STAR topology all devices in a network are connected to a central device

B. In the STAR topology all devices in a network are connected to each other

C. In the STAR topology there is no need to required physical cable

D. None of the above

What is the correct answer?

4

VIRUS stands for?

A. Visual Information Resources Under Seized

B. Vital Information Resources Under Server

C. Vital Information Resources Under Seized

D. Vital Information Resources Unified Seized

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the OSI model?

A. The OSI model is a reference model that describes the network functionalities.

B. The OSI model is an implemented model that describes only network protocols.

C. The OSI model is an implemented model that describes only network topologies.

D. None of the above.

What is the correct answer?

4

AM stands for?

A. Access Module

B. Abstract Module

C. Amplitude Modulation

D. Amplitude Module

What is the correct answer?

4

What are the correct protocols used by RING topology?
a) Fiber Distributed Data Interface
b) Token Ring
c) Metro Ring
d) Ticket Ring
Options:

A. Only A

B. A, B, and C

C. B and D

D. Only B

What is the correct answer?

4

Which cryptography mechanism is used SSL?

A. Symmetric cryptography

B. Asymmetric cryptography

C. Both

D. None

What is the correct answer?

4

Which of the following interface is used between the SGSN and GGSN?

A. Gn interface

B. Um interface

C. Gb interface

D. None of the above

What is the correct answer?

4

Which default port is used for SSL based IMAP?

A. 553

B. 443

C. 143

D. 993

What is the correct answer?

4

Who was developed FTP?

A. Bill gates

B. Abhay bhushan

C. H C Verma

D. Manindra agrawal

What is the correct answer?

4

Which of following VPNs supports torrenting?
a) NordVPN
b) Surfshark
c) EncVPN
d) ExpressVPN
Options:

A. A and B

B. A and C

C. A, B, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following RFC number is related to FTP?

A. RFC 114

B. RFC 220

C. RFC 225

D. RFC 235

What is the correct answer?

4

In which network topology all hosts are connected to each other in a network?

A. Star

B. Ring

C. Hybrid

D. Mesh

What is the correct answer?

4

What are the elements of PKI?
a) Certificate management system
b) Certificate authority
c) Registration authority
d) SSL certificate
Options:

A. A and B

B. B, C, and D

C. A, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following is not the component of the SMTP protocol?

A. Mail Transfer Agent

B. User Agent

C. Server Agent

D. None of the above

What is the correct answer?

4

Which of the following types of VLAN connections are supported by Switch?

A. Access Link

B. Trunk Link

C. Both of the above

D. None of the above

What is the correct answer?

4

How can we send some data or information to the particular webpage using URL?

A. Using Select Query

B. Using Query String

C. Using some special ports

D. Using the FTP protocol

What is the correct answer?

4

Who was invented HTTPS?

A. Oracle

B. Google

C. Netscape Communications

D. Microsoft

What is the correct answer?

4

There are the following statements that are given below, which of them are the disadvantages of FTP protocol?
a) All FTP providers do not provide encrypted transfer of files.
b) It does not allow simultaneous transfers with multiple receivers.
c) We cannot send a very large file due to the size limit.
d) FTP is not supported in Linux operating system.
Options:

A. A and B

B. B and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

There are following statements that are given below, which of them are correct about email addresses?
a) E-mail addresses are case sensitive.
b) E-mail address contains the domain name and user name.
c) In the e-mail address, the user name and domain name are separated by the dollar symbol.
d) E-mail addresses cannot be duplicated.
Options:

A. A and B

B. B and D

C. A, B, and C

D. A, B, and D

What is the correct answer?

4

Which of the following are application layer protocols?

A. FTP

B. HTTP

C. SNMP

D. All of the above

What is the correct answer?

4

What is the default port for DB2 database server?

A. 10000

B. 20000

C. 35000

D. 50000

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about HTTP Messages?

A. HTTP messages are used to data CSS data from HTTP Server to the HTTP client.

B. HTTP messages are used to describe how data transferred between an HTTP client and an HTTP server.

C. Both of the above

D. None of the above

What is the correct answer?

4

Which of the following correct problems in WiFi technology?
a) Backward Compatibility
b) Interoperability
c) Security issues
d) None of the above
Options:

A. A and B

B. A and C

C. A, B, and C

D. D

What is the correct answer?

4

What is the default IP address of the localhost?

A. 127.0.0.1

B. 192.168.10.1

C. 255.255.255.255

D. 255.255.255.0

What is the correct answer?

4

What is the full form of PKI related to SSL?

A. Public Key Infrastructure

B. Private Key Infrastructure

C. Public Key Instructions

D. Private Key Instructions

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about SSH protocol?
a) It is a remote login protocol, which is used to remotely log in using the command line.
b) SSH stands for Secure Shell.
c) Port 22 is used for SSH by default.
d) To use SSH protocol we required SSH server and SSH client programs.
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which of the following is/are unique identifiers for network device(s)?

A. Hostname

B. IP address

C. Mac address

D. All the above

What is the correct answer?

4

Which of the following remote login protocols are supported by the PuTTY application?
a) SSH
b) telnet
c) Rlogin
d) VNC
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

In which year, the SMTP was proposed the first time?

A. 1980

B. 1982

C. 1983

D. 1988