Home
Current Affairs January 2024

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the computer network?

A. A computer network is an interconnection between multiple devices to share hardware resources and information.

B. A computer network is an interconnection between multiple devices to share hardware resources only.

C. Computer network is an interconnection between multiple devices to share only information among all devices.

D. None of the above

Correct Answer :

A. A computer network is an interconnection between multiple devices to share hardware resources and information.


Related Questions

What is the correct answer?

4

What is the full form of NVT?

A. Network Viewer Terminal

B. Network Virtual Terminal

C. Next Virtual Terminal

D. Network Viewer Telecast

What is the correct answer?

4

TLS stands for?

A. Top Layer Security

B. Transfer Latest Security

C. Transport Layer Security

D. Top Level Security

What is the correct answer?

4

Which default port is used for Telnet?

A. 23

B. 14

C. 16

D. 22

What is the correct answer?

4

Which default port is used for SSL based LDAP?

A. 636

B. 536

C. 436

D. 389

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the WiFi hotspot?
a) A WiFi hotspot is an area where devices like computers, mobile can access internet connection.
b) A WiFi hotspot can be created by installing a WiFi Access Point.
c) A WiFi access point can transmit signals in a limited area, know as the WiFi hotspot area.
d) All of the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which of the following are correct IEEE 802.11 network PHY standards?
a) 11a
b) 11b
c) 11p
d) 11y
Options:

A. A and B

B. A , B, and C

C. A, B, and D

D. A, B, C, and, D

What is the correct answer?

4

In which year SSH was developed?

A. 1990

B. 1992

C. 1995

D. 1998

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about remote login?
a) Remote login is a mechanism that is used to access the computer which is located in a different location using remote login protocols.
b) Using remote login we can access the computer through the command line only.
c) Now a day's remote login is very popular for remote support in almost all companies.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

What are the functions of the Certificate Management System?

A. It is used to store the certificate.

B. It is used to validate the certificate.

C. It is used to revoke certificates.

D. All of the above

What is the correct answer?

4

Which FTP response code is used for Bad sequence of commands?
a) DNS
b) Inverse ARP
c) BOOTP
d) DHCP
Options:

A. 501

B. 502

C. 503

D. 504

What is the correct answer?

4

Who was invented email?

A. Ray Tomlinson

B. Robert E. Kahn

C. Shiva Ayyaduria

D. Vint Cerf

What is the correct answer?

4

IMAP stands for?

A. International Message Access Protocol

B. Internet Message Access Protocol

C. Invert Message Access Protocol

D. Internet Media Access Protocol

What is the correct answer?

4

HTTPS stands for?

A. Hyper Text Transfer Protocol Secure

B. Hyper Text Transfer Protocol Saturn

C. Hyper Time Transfer Protocol Saturn

D. Hyper Time Transfer Protocol Secure

What is the correct answer?

4

Which of the following number is assigned for IPv4 in the protocol type field of ARP message format?

A. 0x400

B. 0x800

C. 0x100

D. 0x200

What is the correct answer?

4

Which layer of the OSI model is responsible for compression?

A. Session Layer

B. Network Layer

C. Presentation Layer

D. Transport Layer

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about DNS in computer networks?

A. A DNS is a server which is used to convert web address or a URL into the corresponding IP address

B. A DNS is used to send or upload a data file to the server

C. A DNS is used to download the data file from the server

D. A DNS server is used to save data files into computer memory

What is the correct answer?

4

Which of the following configuration file is used to control on which port RPC and other services are listening in the Redhat Linux operating system?

A. /etc/sysconfig/nfs/

B. /etc/fstab/

C. /etc/exports

D. None of the above

What is the correct answer?

4

How many cables are required when N devices are connected with HUB in STAR topology?

A. N-1

B. N+1

C. N

D. N+2

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about VLAN Tagging?
a) The VLAN tagging is used to handle more than one VLAN on a port.
b) VLAN tagging can be performed by putting VLAN ID into the header to identify the network.
c) VLAN tagging is also known as VLAN trunking.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about HTTP Messages?

A. HTTP messages are used to data CSS data from HTTP Server to the HTTP client.

B. HTTP messages are used to describe how data transferred between an HTTP client and an HTTP server.

C. Both of the above

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about VPN?
a) VPN stands for Virtual Private Network.
b) It is a technology that is used to create a secured connection over a less secured network.
c) Using the VPN, we can extend our private network using the internet.
d) All of the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

TCP stands for?

A. Transport Control Protocol

B. Transfer Control Protocol

C. Transmission Control Protocol

D. Transfer Congestion Protocol

What is the correct answer?

4

In which layer of OSI, Network topologies are used?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

In which year, the SMTP was proposed the first time?

A. 1980

B. 1982

C. 1983

D. 1988

What is the correct answer?

4

In which topology data is travel in a circular fashion from one node to another node in the network?

A. Star

B. Mesh

C. Bus

D. Ring

What is the correct answer?

4

What are the new features in TLS 1.1 over TLS1.0?
a) Protection against CBC attacks
b) Implicit Initialization Vector
c) Explicit Initialization Vector
d) Implemented SHA-256
Options:

A. A and B

B. A and C

C. A, B, and D

D. B, C, and D

What is the correct answer?

4

What is the correct range of specific well-known ports, like 80 for HTTP in computer networks?

A. 0 1023

B. 1024 49151

C. 49152 65535

D. All the above

What is the correct answer?

4

There are the following options that are given below, which of them are correct directives of HTTP Cache request?
a) no-cache
b) max-state
c) min-fresh
d) only-if-cached
Options:

A. A and B

B. A, B, C, and D

C. C and D

D. A, B, and C

What is the correct answer?

4

MTP stands for?

A. Message Type Protocol

B. Message Transfer Protocol

C. Media Transfer Protocol

D. Media Transmission Protocol

What is the correct answer?

4

Which technique is used to provide a small name for the complete URL?

A. URL cutting

B. URL minimizing

C. URL shortening

D. URL smalling