Related Questions
What is the correct answer?
4
What is the full form of NVT?
A. Network Viewer Terminal
B. Network Virtual Terminal
D. Network Viewer Telecast
What is the correct answer?
4
TLS stands for?
B. Transfer Latest Security
C. Transport Layer Security
What is the correct answer?
4
Which default port is used for Telnet?
What is the correct answer?
4
Which default port is used for SSL based LDAP?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about the WiFi hotspot?
a) A WiFi hotspot is an area where devices like computers, mobile can access internet connection.
b) A WiFi hotspot can be created by installing a WiFi Access Point.
c) A WiFi access point can transmit signals in a limited area, know as the WiFi hotspot area.
d) All of the above
Options:
What is the correct answer?
4
Which of the following are correct IEEE 802.11 network PHY standards?
a) 11a
b) 11b
c) 11p
d) 11y
Options:
What is the correct answer?
4
In which year SSH was developed?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about remote login?
a) Remote login is a mechanism that is used to access the computer which is located in a different location using remote login protocols.
b) Using remote login we can access the computer through the command line only.
c) Now a day's remote login is very popular for remote support in almost all companies.
d) All the above
Options:
What is the correct answer?
4
What are the functions of the Certificate Management System?
A. It is used to store the certificate.
B. It is used to validate the certificate.
C. It is used to revoke certificates.
What is the correct answer?
4
Which FTP response code is used for Bad sequence of commands?
a) DNS
b) Inverse ARP
c) BOOTP
d) DHCP
Options:
What is the correct answer?
4
Who was invented email?
What is the correct answer?
4
IMAP stands for?
A. International Message Access Protocol
B. Internet Message Access Protocol
C. Invert Message Access Protocol
D. Internet Media Access Protocol
What is the correct answer?
4
HTTPS stands for?
A. Hyper Text Transfer Protocol Secure
B. Hyper Text Transfer Protocol Saturn
C. Hyper Time Transfer Protocol Saturn
D. Hyper Time Transfer Protocol Secure
What is the correct answer?
4
Which of the following number is assigned for IPv4 in the protocol type field of ARP message format?
What is the correct answer?
4
Which layer of the OSI model is responsible for compression?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about DNS in computer networks?
A. A DNS is a server which is used to convert web address or a URL into the corresponding IP address
B. A DNS is used to send or upload a data file to the server
C. A DNS is used to download the data file from the server
D. A DNS server is used to save data files into computer memory
What is the correct answer?
4
Which of the following configuration file is used to control on which port RPC and other services are listening in the Redhat Linux operating system?
What is the correct answer?
4
How many cables are required when N devices are connected with HUB in STAR topology?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about VLAN Tagging?
a) The VLAN tagging is used to handle more than one VLAN on a port.
b) VLAN tagging can be performed by putting VLAN ID into the header to identify the network.
c) VLAN tagging is also known as VLAN trunking.
d) All the above
Options:
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about HTTP Messages?
A. HTTP messages are used to data CSS data from HTTP Server to the HTTP client.
B. HTTP messages are used to describe how data transferred between an HTTP client and an HTTP server.
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about VPN?
a) VPN stands for Virtual Private Network.
b) It is a technology that is used to create a secured connection over a less secured network.
c) Using the VPN, we can extend our private network using the internet.
d) All of the above
Options:
What is the correct answer?
4
TCP stands for?
A. Transport Control Protocol
B. Transfer Control Protocol
C. Transmission Control Protocol
D. Transfer Congestion Protocol
What is the correct answer?
4
In which layer of OSI, Network topologies are used?
What is the correct answer?
4
In which year, the SMTP was proposed the first time?
What is the correct answer?
4
In which topology data is travel in a circular fashion from one node to another node in the network?
What is the correct answer?
4
What are the new features in TLS 1.1 over TLS1.0?
a) Protection against CBC attacks
b) Implicit Initialization Vector
c) Explicit Initialization Vector
d) Implemented SHA-256
Options:
What is the correct answer?
4
What is the correct range of specific well-known ports, like 80 for HTTP in computer networks?
What is the correct answer?
4
There are the following options that are given below, which of them are correct directives of HTTP Cache request?
a) no-cache
b) max-state
c) min-fresh
d) only-if-cached
Options:
What is the correct answer?
4
MTP stands for?
B. Message Transfer Protocol
C. Media Transfer Protocol
D. Media Transmission Protocol
What is the correct answer?
4
Which technique is used to provide a small name for the complete URL?