Home
Current Affairs January 2024

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about HTTP Messages?

A. HTTP messages are used to data CSS data from HTTP Server to the HTTP client.

B. HTTP messages are used to describe how data transferred between an HTTP client and an HTTP server.

C. Both of the above

D. None of the above

Correct Answer :

A. HTTP messages are used to data CSS data from HTTP Server to the HTTP client.


Related Questions

What is the correct answer?

4

Which of the following is/are not network device(s)?

A. Bridge

B. Repeater

C. Mesh

D. Hub

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about TLS?
a) TLS stands for Transport Layer Security.
b) TLS is a security protocol that is used to implement secured communication between a web browser and a web server.
c) TLS is also used to implement secured communication for emails, messaging, etc.
d) SSL is the advanced version of TLS.
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

In which topology all devices are connected with a single backbone cable?

A. Star

B. Mesh

C. Bus

D. Ring

What is the correct answer?

4

Which of the following are correct types of network topologies in computer networks?

A. Bus

B. Tree

C. Mesh

D. All of the above

What is the correct answer?

4

What is the full form of W3C?

A. World Wide Web Council

B. World Wide Web Corporation

C. World Wide Web Consortium

D. World Wide Web Collaboration

What is the correct answer?

4

Which default port is used for Tomcat Startup?

A. 8080

B. 8090

C. 9082

D. None of the above

What is the correct answer?

4

Which of the following protocols are used with HTTPS for security mechanism?

A. SSL

B. TLS

C. Both

D. None

What is the correct answer?

4

In which area we can expend a WAN network?

A. We can expend a WAN network within the city

B. We can expend a WAN within an organization only

C. We can expend a WAN network within the country

D. We can expend a WAN network all over the world

What is the correct answer?

4

Which of the following are correct GSM network elements?
a) Mobile Station
b) BSC
c) BTS
d) GPRS server nodes
Options:

A. A and B

B. B, C, and D

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

Which layer of the OSI model is responsible for actual physical connections among the network devices?

A. Data Link Layer

B. Network Layer

C. Transport Layer

D. Physical Layer

What is the correct answer?

4

UHF stands for?

A. Ultimate High Frequency

B. Universal High Frequency

C. Union High Frequency

D. Ultra High Frequency

What is the correct answer?

4

Which default port is used for LDAP?

A. 636

B. 536

C. 436

D. 389

What is the correct answer?

4

What are the new features in TLS 1.1 over TLS1.0?
a) Protection against CBC attacks
b) Implicit Initialization Vector
c) Explicit Initialization Vector
d) Implemented SHA-256
Options:

A. A and B

B. A and C

C. A, B, and D

D. B, C, and D

What is the correct answer?

4

The OSI model was developed by?

A. Advanced Research Project Agency

B. International Organization of Standardization

C. Internet Service Provider

D. Bell Laboratory

What is the correct answer?

4

Who was invented HTTPS?

A. Oracle

B. Google

C. Netscape Communications

D. Microsoft

What is the correct answer?

4

Which of the following RFC number is related to URL?

A. RFC 1735

B. RFC 1738

C. RFC 2020

D. RFC 2021

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the advantages of HTTPS?
a) Data Integrity
b) Encryption based security
c) Search Engine Optimization
d) Antivirus protection
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

What is the full form of LiFi?

A. Line Fidelity

B. Local Fidelity

C. Light Fidelity

D. Logical Fidelity

What is the correct answer?

4

How many bytes are used in IPv4 addresses?

A. 4

B. 8

C. 16

D. 32

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about SSL handshake?
a) SSL handshake is a process between the web browser and web servers used for verification.
b) SSL handshake begins before transferring actual data.
c) SSL handshake is used to verify the SSL certificate.
d) SSL handshake is used for webserver authentication.
Options:

A. A and B

B. A and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are following options that are given below, where can we use full-duplex?
a) Switch to Switch
b) Host to Host
c) Hub to Hub
d) Switch to host
Options:

A. A, B and D

B. A and B only

C. A and D only

D. Only C

What is the correct answer?

4

What is the full form of CSMA/CA?

A. Carrier Sense Media Access with Collision Avoidance

B. Carrier Sense Multiple Access with Collision Avoidance

C. Carrier Sense Minimum Access with Collision Avoidance

D. Carrier Sense Maximum Access with Collision Avoidance

What is the correct answer?

4

What are the correct examples of media in internetworking?

A. Copper cables

B. Fiber cables

C. Wireless signals

D. All of the above

What is the correct answer?

4

What is the full form of NVT?

A. Network Viewer Terminal

B. Network Virtual Terminal

C. Next Virtual Terminal

D. Network Viewer Telecast

What is the correct answer?

4

What is the full form of RDF related to WWW?

A. Resource Description Framework

B. Reliable Document Framework

C. Robust Descriptive Framework

D. Resource Document Framework

What is the correct answer?

4

What is the full form of RPC?

A. Remote Program Cast

B. Remote Predefined Calls

C. Remote Procedure Call

D. Resources Procedure Call

What is the correct answer?

4

What is the full form of MTA used in SMTP?

A. Mail Time Association

B. Mail Trim Agent

C. Mail Transmission Agent

D. Mail Transfer Agent

What is the correct answer?

4

Which command is used to initiate the SMTP conversation?

A. EHELLO

B. CHELLO

C. HELLO

D. HELLOMAIL

What is the correct answer?

4

What is the full form of TKIP?

A. Temporal Key Integrity Protocol

B. Temporary Key Integration Protocol

C. Template Key Internal Protocol

D. Temporary Key Internal Protocol

What is the correct answer?

4

Which of the following commands are used for NFS?
a) exportfs -v
b) exportfs -u
c) showmount -d
d) exportnfs - k
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D