Home
Current Affairs January 2024

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about remote login?
a) Remote login is a mechanism that is used to access the computer which is located in a different location using remote login protocols.
b) Using remote login we can access the computer through the command line only.
c) Now a day's remote login is very popular for remote support in almost all companies.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

Correct Answer :

B. A and C


Related Questions

What is the correct answer?

4

In which year FTP was developed?

A. 1987

B. 1971

C. 1988

D. 2001

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about SSL handshake?
a) SSL handshake is a process between the web browser and web servers used for verification.
b) SSL handshake begins before transferring actual data.
c) SSL handshake is used to verify the SSL certificate.
d) SSL handshake is used for webserver authentication.
Options:

A. A and B

B. A and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

What is the full form of CSR related to the SSL Certificate?

A. Certificate Signing Request

B. Certificate Signal Response

C. Certificate Sample Resources

D. Certificate Sample Response

What is the correct answer?

4

Which of the following correct problems in WiFi technology?
a) Backward Compatibility
b) Interoperability
c) Security issues
d) None of the above
Options:

A. A and B

B. A and C

C. A, B, and C

D. D

What is the correct answer?

4

There are the following methods that are given below, which of them are correct methods used in an HTTP request?
a) GET
b) POST
c) CONNECT
d) DELETE
Options:

A. A and B

B. A, B, and C

C. A, B, and D

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about HTTP?
a) HTTP is media independent protocol
b) It is a stateless protocol
c) It is a connectionless protocol
d) HTTP is mainly used to fetch HTML documents
Options:

A. A, B, C, and D

B. A, B, and C

C. B, C, and D

D. A, C, and D

What is the correct answer?

4

POP3 stands for?

A. Presentation Operational Protocol version 3

B. Post Office Protocol version 3

C. Post Operational Protocol version 3

D. Pre Office Protocol version 3

What is the correct answer?

4

There are the following statements that are given below which of them are correct about WWW?
a) WWW provides Cross-Platform for websites.
b) It provides Hyper Text Information that can be accessed easily.
c) It provides Open Standards and Open Source.
d) It provides a single interface form different service.
Options:

A. C and D

B. A and B

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following command is used to generate SSH keys in the Linux operating system?

A. keygen-ssh

B. ssh-keygen

C. ssh-key

D. ssk-genkey

What is the correct answer?

4

There are the following options that are given below, which of them an IEEE standard is used in Frame tagging?

A. 802.11

B. 802.1Q

C. 802.3

D. 802.16

What is the correct answer?

4

Which of the following is/are unique identifiers for network device(s)?

A. Hostname

B. IP address

C. Mac address

D. All the above

What is the correct answer?

4

Which of the following GPRS class of terminal equipment is used to manage both packet data and voice simultaneously?

A. Class A

B. Class B

C. Class C

D. Class D

What is the correct answer?

4

A MAC is also known as?

A. Physical address

B. IP address

C. Hardware address

D. Both physical address and hardware address

What is the correct answer?

4

Which of the following types of VLAN connections are supported by Switch?

A. Access Link

B. Trunk Link

C. Both of the above

D. None of the above

What is the correct answer?

4

How many bits are used in IPv6 address?

A. 32 bits

B. 64 bits

C. 128 bits

D. 256 bits

What is the correct answer?

4

Which of the following are not valid email client software?
a) Microsoft Outlook
b) Thunderbird
c) eM Client
d) Mailbird
Options:

A. B

B. B and C

C. D

D. All are valid email client software

What is the correct answer?

4

Which of the following schemes can be used in a URL?
a) http://
b) telnet://
c) file://
d) ftp://
Options:

A. A and B

B. A, B, and D

C. A and D

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below, what are the disadvantages of BUS topology in a computer network.
a) If the main cable is damaged then the complete network will not work.
b) Network disturbance occurs when we add or remove a device into a network.
c) Performance gets decreased when a new node is added to the network.
d) There is a security issue because every node in the network can access the data for other nodes.
Options:

A. A and B

B. B and C

C. C and D

D. A, B, C, and, D

What is the correct answer?

4

The URL shortening can be?

A. Temporary for limited time

B. Permanent

C. Both

D. None

What is the correct answer?

4

Which default port is used for IMAP?

A. 553

B. 443

C. 143

D. 993

What is the correct answer?

4

What is the full form of SSTP protocol?

A. Secure Socket Tunneling Protocol

B. Secure Service Tunneling Protocol

C. Secure Server Tunneling Protocol

D. Secure Saver Tunneling Protocol

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about SSL?
a) SSL protocol is used for securing communication by sending and receiving data in the encrypted format.
b) SSL stands for Secure Socket Layer
c) SSL uses certificates to implement a secure mechanism.
d) SSL also used to save data into memory in a secure manner.
Options:

A. A and B

B. A, B, and C

C. B and C

D. A, B, C, and D

What is the correct answer?

4

What is the full form of BSC in GSM network?

A. Base Service Communication

B. Basic Service Communication

C. Base System Controller

D. Base Station Controller

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about NFS?
a) The NFS is used to share file system resources over the network.
b) NFS stands for Network File system.
c) NFS is a client/server protocol where File system resources at the server and accessed by the clients.
d) NFS is not a client/ server protocol.
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, and D

What is the correct answer?

4

If N devices are connected in a MESH network, then how many dedicated links are required to them?

A. N

B. N+1

C. N(N+1)

D. N(N-1)/2

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about STAR network topologies in computer networks?

A. In the STAR topology all devices in a network are connected to a central device

B. In the STAR topology all devices in a network are connected to each other

C. In the STAR topology there is no need to required physical cable

D. None of the above

What is the correct answer?

4

MAC stands for?

A. Most Accessible Controller

B. Mobile Access Control

C. Mobile Access Communication

D. Media Access Control

What is the correct answer?

4

What is the full form of TNFS?

A. Trivial Network File System

B. Triple Network File System

C. Trusted Network File System

D. Temporary Network File System

What is the correct answer?

4

VHF stands for?

A. Very High Frequency

B. Visual High Frequency

C. Virtual High Frequency

D. Virtual Host Frequency

What is the correct answer?

4

Which of the following daemons are used at the NFS server in the Linux operating system?
a) nfsd
b) rpcbind
c) mountd
d) kmpd
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D