Related Questions
What is the correct answer?
4
What is the full form of GSM?
A. Global System for Mobile
B. Global Service for Mobile
C. General Service for Mobile
D. General System for Mobile
What is the correct answer?
4
Which of the following are functions of the application layer?
What is the correct answer?
4
There are the following options that are given below, which of them are correct parameters of the UDP header?
a) Source Port number
b) Destination Port Number
c) Checksum
d) Flow control Flags
Options:
What is the correct answer?
4
Which default port is used for Tomcat Startup?
What is the correct answer?
4
Which default port is used for MS SQL Server?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about SSH protocol?
a) It is a remote login protocol, which is used to remotely log in using the command line.
b) SSH stands for Secure Shell.
c) Port 22 is used for SSH by default.
d) To use SSH protocol we required SSH server and SSH client programs.
Options:
What is the correct answer?
4
UMTS stands for?
A. Universal Mobile Telecommunication System
B. Ultimate Mobile Telecommunication System
C. Unique Mobile Telecommunication System
D. Useful Mobile Telecommunication System
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about FTP?
a) FTP stands for File Transmission Protocol.
b) FTP is used to transfer files between clients and servers in the network.
c) FTP is a transport layer protocol.
d) FTP works with the command line as well as a graphical user interface.
Options:
What is the correct answer?
4
Which of the following is/are network device(s)?
What is the correct answer?
4
Which of the following are the parts of VPN logs?
a) User activities
b) Devices used
c) IP addresses
d) Connection and disconnection timestamps
Options:
What is the correct answer?
4
Which of the following are the parts of the HTTP response?
a) Status
b) Message Body
c) The encryption key used for HTTP protocol security
d) Header fields for a response
Options:
What is the correct answer?
4
Which of the following daemons are used at the NFS server in the Linux operating system?
a) nfsd
b) rpcbind
c) mountd
d) kmpd
Options:
What is the correct answer?
4
A MAC address of the device is assigned by?
What is the correct answer?
4
Which of the following are not correct types of network topologies in computer networks?
What is the correct answer?
4
Which of the following are valid formats of SSL certificates?
a) PEM
b) DER
c) PKCS#7
d) PKCS#25
Options:
What is the correct answer?
4
Which default port is used for NNTP?
What is the correct answer?
4
There are following statements that are given below, which of them are correct about emails?
a) E-mail stands for Electronic Mail.
b) E-mail is used for sending and receiving text, images, and video files.
c) E-mail is also used for identity in the internet world.
d) E-mails are not secured enough for data transmission.
Options:
What is the correct answer?
4
A SSL certificate is also known as?
D. Cryptology Certificate
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about MESH network topologies in computer networks?
A. In the MESH topology all devices in a network are connected to a central device
B. In the MESH topology all devices in a network are connected to each other
C. In the MESH topology there is no need to required physical cable
What is the correct answer?
4
Which of the following are components of the GPRS support node?
a) Gateway GPRS support node
b) Subnet GPRS support node
c) Serving GPRS support node
d) All the above
Options:
What is the correct answer?
4
Which POP command is used to log off the session?
What is the correct answer?
4
Which of the following are the components of the FTP Server?
a) Control process
b) Data transfer process
c) User Interface
d) None of the above
Options:
What is the correct answer?
4
The version number of HTTP contains?
a) Major number
b) Minor number
c) UID
d) All the above
Options:
What is the correct answer?
4
There are the following options that are given below, which of them are part of the IEEE Ethernet frame header?
a) FCS field
b) Network addresses
c) Mac addresses
d) Network and Mac addresses
Options:
What is the correct answer?
4
How can we get a list of active ports in the Windows operating system?
A. Using netstate a command from the command line
B. Using netstat a command from the command line
C. Using getports -a command from the command line
What is the correct answer?
4
A MAC is also known as?
D. Both physical address and hardware address
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about SSL handshake?
a) SSL handshake is a process between the web browser and web servers used for verification.
b) SSL handshake begins before transferring actual data.
c) SSL handshake is used to verify the SSL certificate.
d) SSL handshake is used for webserver authentication.
Options:
What is the correct answer?
4
Which of the following HTTP response code is used for temporary redirection?
What is the correct answer?
4
What Certificate Authorities do?
A. Certificate Authorities authenticate the identity of computers.
B. Certificate Authorities authenticate the identity of Individuals.
What is the correct answer?
4
What the first inter-connected network is?