Home
Current Affairs January 2024

What is the correct answer?

4

There are the following statements that are given below, which of them are correct statements about GPRS?
a) GPRS provides consistent IP services.
b) It provides wireless internet accesses over mobile phones.
c) GPRS uses the same infrastructure for different air interfaces.
d) GPRS is older technology; it does not use in the current scenario.
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

Correct Answer :

B. A, B, and C


Related Questions

What is the correct answer?

4

Which FTP response code is used for Not logged in?

A. 520

B. 530

C. 540

D. 550

What is the correct answer?

4

In which network topology all hosts are connected to each other in a network?

A. Star

B. Ring

C. Hybrid

D. Mesh

What is the correct answer?

4

Which layer of the OSI model is responsible for bit rate?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about SSH protocol?
a) It is a remote login protocol, which is used to remotely log in using the command line.
b) SSH stands for Secure Shell.
c) Port 22 is used for SSH by default.
d) To use SSH protocol we required SSH server and SSH client programs.
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which of the following are the components of the FTP Server?
a) Control process
b) Data transfer process
c) User Interface
d) None of the above
Options:

A. A and B

B. A and C

C. A, B, and C

D. D

What is the correct answer?

4

What are the elements of PKI?
a) Certificate management system
b) Certificate authority
c) Registration authority
d) SSL certificate
Options:

A. A and B

B. B, C, and D

C. A, C, and D

D. A, B, C, and D

What is the correct answer?

4

What are the correct protocols used by RING topology?
a) Fiber Distributed Data Interface
b) Token Ring
c) Metro Ring
d) Ticket Ring
Options:

A. Only A

B. A, B, and C

C. B and D

D. Only B

What is the correct answer?

4

There are the following options that are given below, which of them are correct types of computer networks?

A. WAN

B. LAN

C. MAN

D. All of the above

What is the correct answer?

4

Which default port is used for MQ Listener?

A. 1515

B. 1414

C. 1616

D. 1717

What is the correct answer?

4

AM stands for?

A. Access Module

B. Abstract Module

C. Amplitude Modulation

D. Amplitude Module

What is the correct answer?

4

What is the full form of PKI related to SSL?

A. Public Key Infrastructure

B. Private Key Infrastructure

C. Public Key Instructions

D. Private Key Instructions

What is the correct answer?

4

In which network topology, all hosts are connected to the central device?

A. Star

B. Ring

C. Hybrid

D. Mesh

What is the correct answer?

4

Which of the following are the parts of the HTTP response?
a) Status
b) Message Body
c) The encryption key used for HTTP protocol security
d) Header fields for a response
Options:

A. A and B

B. B and D

C. B, C, and D

D. A, B, and D

What is the correct answer?

4

Which of the following is responsible for allocating radio resources to the mobile calls?

A. Mobile Station

B. BSC

C. BS

D. None of the above

What is the correct answer?

4

NetBIOS stands for?

A. Network Basic Input Output Server

B. Network Basic Input Output System

C. Network Basic Input Output Service

D. Next Basic Input Output Server

What is the correct answer?

4

Which command is used to initiate the SMTP conversation?

A. EHELLO

B. CHELLO

C. HELLO

D. HELLOMAIL

What is the correct answer?

4

There are the following options that are given below, which of them are correct functionalities of the router?

A. Internetwork communication

B. Packet switching

C. Selection of best route

D. All of the above

What is the correct answer?

4

Which default port is used for Secure Shell?

A. 12

B. 14

C. 16

D. 22

What is the correct answer?

4

The version number of HTTP contains?
a) Major number
b) Minor number
c) UID
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

In which year, the SMTP was proposed the first time?

A. 1980

B. 1982

C. 1983

D. 1988

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about WiFi?
a) WiFi is used to create a wireless network that provides broadband coverage in the local area.
b) WiFi stands for Wireless Fiction.
c) It is based on the IEEE 802.11 standard.
d) We can create a wireless network in the limit area using WiFi.
Options:

A. A and B

B. A and C

C. A, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following is/are not network device(s)?

A. Bridge

B. Repeater

C. Mesh

D. Hub

What is the correct answer?

4

What do you understand about the physical layout in network topologies?

A. The physical layout that describes the physical placements of network devices

B. The physical layout describes the flow of data within the network

C. The physical layout that describes cables only used in the network

D. All the above

What is the correct answer?

4

Which of following VPNs works on the Android operating system?
a) NordVPN
b) AndrVPN
c) Surfshark
d) ExpressVPN
Options:

A. A and B

B. A , C, and D

C. A, B, and D

D. A, B, C, and D

What is the correct answer?

4

In which year e-mail was invented?

A. 1971

B. 1972

C. 1975

D. 1977

What is the correct answer?

4

Which POP command is used to log off the session?

A. LOGOUT

B. LOGOFF

C. QUIT

D. EXIT

What is the correct answer?

4

VHF stands for?

A. Very High Frequency

B. Visual High Frequency

C. Virtual High Frequency

D. Virtual Host Frequency

What is the correct answer?

4

There are the following RFC numbers that are given below, which of them are related to TLS?
a) RFC 6066
b) RFC 6961
c) RFC 7961
d) RFC 8446
Options:

A. A and B

B. A, B, and C

C. A, B, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following correct problems in WiFi technology?
a) Backward Compatibility
b) Interoperability
c) Security issues
d) None of the above
Options:

A. A and B

B. A and C

C. A, B, and C

D. D

What is the correct answer?

4

Which of the following command is used to generate SSH keys in the Linux operating system?

A. keygen-ssh

B. ssh-keygen

C. ssh-key

D. ssk-genkey