Related Questions
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about remote login?
a) Remote login is a mechanism that is used to access the computer which is located in a different location using remote login protocols.
b) Using remote login we can access the computer through the command line only.
c) Now a day's remote login is very popular for remote support in almost all companies.
d) All the above
Options:
What is the correct answer?
4
There are following options that are given below, where can we use full-duplex?
a) Switch to Switch
b) Host to Host
c) Hub to Hub
d) Switch to host
Options:
What is the correct answer?
4
Which of the following are valid formats of SSL certificates?
a) PEM
b) DER
c) PKCS#7
d) PKCS#25
Options:
What is the correct answer?
4
Which of the following remote login protocols are supported by the PuTTY application?
a) SSH
b) telnet
c) Rlogin
d) VNC
Options:
What is the correct answer?
4
What is the full form of TKIP?
A. Temporal Key Integrity Protocol
B. Temporary Key Integration Protocol
C. Template Key Internal Protocol
D. Temporary Key Internal Protocol
What is the correct answer?
4
Who was developed SSTP protocol?
What is the correct answer?
4
Which layer of the OSI model is responsible for actual physical connections among the network devices?
What is the correct answer?
4
What are the correct types of SSL certificates?
a) Domain Validation
b) Extended Validation
c) Country Validation
d) Organization Validation
Options:
What is the correct answer?
4
There are the following RFC numbers are given below, which of them are related to HTTP?
a) RFC 2616
b) RFC 3616
c) RFC 7230
d) RFC 7231
Options:
What is the correct answer?
4
What is the default port for HTTP?
What is the correct answer?
4
DCCP stands for?
A. Datagram Congestion Control Protocol
B. Data Control Congestion Protocol
C. Datagram Control Congestion Protocol
D. Dynamic Congestion Control Protocol
What is the correct answer?
4
Which of following VPNs works on the Android operating system?
a) NordVPN
b) AndrVPN
c) Surfshark
d) ExpressVPN
Options:
What is the correct answer?
4
What is the full form of W3C?
A. World Wide Web Council
B. World Wide Web Corporation
C. World Wide Web Consortium
D. World Wide Web Collaboration
What is the correct answer?
4
There are the following options that are given below, which is not the type of flow control?
What is the correct answer?
4
A host address in a URL can be?
What is the correct answer?
4
There are the following statements that are given below, what are the disadvantages of BUS topology in a computer network.
a) If the main cable is damaged then the complete network will not work.
b) Network disturbance occurs when we add or remove a device into a network.
c) Performance gets decreased when a new node is added to the network.
d) There is a security issue because every node in the network can access the data for other nodes.
Options:
What is the correct answer?
4
What do you understand about logical layout in network topologies?
A. The logical layout describes the physical placements of network devices
B. The logical layout describes the flow of data within the network
C. The logical layout that describes cables only used in the network
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about VLAN?
a) VLAN is used to divide a physical network into multiple logical networks.
b) VLAN is used to break large broadcast domains into smaller broadcast domains.
c) VLAN stands for Virtual Local Area Network.
d) VLAN stands for Visual Local Area Network.
Options:
What is the correct answer?
4
There are the following options that are given below, which of them can be done through UDP?
a) Trace Route
b) Time Stamp
c) Record Route
d) All the above
Options:
What is the correct answer?
4
Which default port is used for Oracle Listener?
What is the correct answer?
4
FTP stands for?
A. File Transport Protocol
B. File Transfer Protocol
C. Film Transfer Protocol
What is the correct answer?
4
In which network topology all hosts are connected to each other in a network?
What is the correct answer?
4
What are the functions of the Certificate Management System?
A. It is used to store the certificate.
B. It is used to validate the certificate.
C. It is used to revoke certificates.
What is the correct answer?
4
Which of the following are the types of HTTP header?
a) General header
b) Entity header
c) Request header
d) Response header
Options:
What is the correct answer?
4
Which FTP response code is used for Bad sequence of commands?
a) DNS
b) Inverse ARP
c) BOOTP
d) DHCP
Options:
What is the correct answer?
4
Which of the following are correct VPN protocols?
a) PPTP
b) L2TP
c) SSTP
d) OpenVPN
Options:
What is the correct answer?
4
Which layer of the OSI model is responsible for segmentation and reassembly?
What is the correct answer?
4
There are the following commands that are given below, which command is not used in the FTP protocol?
What is the correct answer?
4
The URL shortening can be?
A. Temporary for limited time
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about HTTP Messages?
A. HTTP messages are used to data CSS data from HTTP Server to the HTTP client.
B. HTTP messages are used to describe how data transferred between an HTTP client and an HTTP server.