Related Questions
What is the correct answer?
4
In which year FTP was developed?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about SSL handshake?
a) SSL handshake is a process between the web browser and web servers used for verification.
b) SSL handshake begins before transferring actual data.
c) SSL handshake is used to verify the SSL certificate.
d) SSL handshake is used for webserver authentication.
Options:
What is the correct answer?
4
What is the full form of CSR related to the SSL Certificate?
A. Certificate Signing Request
B. Certificate Signal Response
C. Certificate Sample Resources
D. Certificate Sample Response
What is the correct answer?
4
Which of the following correct problems in WiFi technology?
a) Backward Compatibility
b) Interoperability
c) Security issues
d) None of the above
Options:
What is the correct answer?
4
There are the following methods that are given below, which of them are correct methods used in an HTTP request?
a) GET
b) POST
c) CONNECT
d) DELETE
Options:
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about HTTP?
a) HTTP is media independent protocol
b) It is a stateless protocol
c) It is a connectionless protocol
d) HTTP is mainly used to fetch HTML documents
Options:
What is the correct answer?
4
POP3 stands for?
A. Presentation Operational Protocol version 3
B. Post Office Protocol version 3
C. Post Operational Protocol version 3
D. Pre Office Protocol version 3
What is the correct answer?
4
There are the following statements that are given below which of them are correct about WWW?
a) WWW provides Cross-Platform for websites.
b) It provides Hyper Text Information that can be accessed easily.
c) It provides Open Standards and Open Source.
d) It provides a single interface form different service.
Options:
What is the correct answer?
4
Which of the following command is used to generate SSH keys in the Linux operating system?
What is the correct answer?
4
There are the following options that are given below, which of them an IEEE standard is used in Frame tagging?
What is the correct answer?
4
Which of the following is/are unique identifiers for network device(s)?
What is the correct answer?
4
Which of the following GPRS class of terminal equipment is used to manage both packet data and voice simultaneously?
What is the correct answer?
4
A MAC is also known as?
D. Both physical address and hardware address
What is the correct answer?
4
Which of the following types of VLAN connections are supported by Switch?
What is the correct answer?
4
How many bits are used in IPv6 address?
What is the correct answer?
4
Which of the following are not valid email client software?
a) Microsoft Outlook
b) Thunderbird
c) eM Client
d) Mailbird
Options:
D. All are valid email client software
What is the correct answer?
4
Which of the following schemes can be used in a URL?
a) http://
b) telnet://
c) file://
d) ftp://
Options:
What is the correct answer?
4
There are the following statements that are given below, what are the disadvantages of BUS topology in a computer network.
a) If the main cable is damaged then the complete network will not work.
b) Network disturbance occurs when we add or remove a device into a network.
c) Performance gets decreased when a new node is added to the network.
d) There is a security issue because every node in the network can access the data for other nodes.
Options:
What is the correct answer?
4
The URL shortening can be?
A. Temporary for limited time
What is the correct answer?
4
Which default port is used for IMAP?
What is the correct answer?
4
What is the full form of SSTP protocol?
A. Secure Socket Tunneling Protocol
B. Secure Service Tunneling Protocol
C. Secure Server Tunneling Protocol
D. Secure Saver Tunneling Protocol
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about SSL?
a) SSL protocol is used for securing communication by sending and receiving data in the encrypted format.
b) SSL stands for Secure Socket Layer
c) SSL uses certificates to implement a secure mechanism.
d) SSL also used to save data into memory in a secure manner.
Options:
What is the correct answer?
4
What is the full form of BSC in GSM network?
A. Base Service Communication
B. Basic Service Communication
C. Base System Controller
D. Base Station Controller
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about NFS?
a) The NFS is used to share file system resources over the network.
b) NFS stands for Network File system.
c) NFS is a client/server protocol where File system resources at the server and accessed by the clients.
d) NFS is not a client/ server protocol.
Options:
What is the correct answer?
4
If N devices are connected in a MESH network, then how many dedicated links are required to them?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about STAR network topologies in computer networks?
A. In the STAR topology all devices in a network are connected to a central device
B. In the STAR topology all devices in a network are connected to each other
C. In the STAR topology there is no need to required physical cable
What is the correct answer?
4
MAC stands for?
A. Most Accessible Controller
C. Mobile Access Communication
What is the correct answer?
4
What is the full form of TNFS?
A. Trivial Network File System
B. Triple Network File System
C. Trusted Network File System
D. Temporary Network File System
What is the correct answer?
4
VHF stands for?
C. Virtual High Frequency
D. Virtual Host Frequency
What is the correct answer?
4
Which of the following daemons are used at the NFS server in the Linux operating system?
a) nfsd
b) rpcbind
c) mountd
d) kmpd
Options: