Related Questions
What is the correct answer?
4
Which of the following protocols are used as a replacement of RARP?
a) DNS
b) Inverse ARP
c) BOOTP
d) DHCP
Options:
What is the correct answer?
4
DHCP stands for?
A. Double Host Committed Protocol
B. Dynamic Host Common Protocol
C. Dynamic Hyper Common Protocol
D. Dynamic Host Configuration Protocol
What is the correct answer?
4
Which of the following are the parts of VPN logs?
a) User activities
b) Devices used
c) IP addresses
d) Connection and disconnection timestamps
Options:
What is the correct answer?
4
Which of the following is not the component of the SMTP protocol?
What is the correct answer?
4
Which of the following is not part of the format of the SSL certificate?
What is the correct answer?
4
Which of the following options are used for file sharing in /etc/exports file in the Redhat Linux?
a) ro
b) rw
c) no_subtree_check
d) no_root_squash
Options:
What is the correct answer?
4
Which utility command is used for FTP in the Linux operating system?
What is the correct answer?
4
Who was developed FTP?
What is the correct answer?
4
Which of the following protocol is used to broadcast MAC address to the entire network when a computer boots up?
What is the correct answer?
4
Which of the following network devices are operated at the physical layer of the OSI model?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about remote login?
a) Remote login is a mechanism that is used to access the computer which is located in a different location using remote login protocols.
b) Using remote login we can access the computer through the command line only.
c) Now a day's remote login is very popular for remote support in almost all companies.
d) All the above
Options:
What is the correct answer?
4
There are the following statements that are given below, what are the advantages of MESH topology in a computer network.
a) It is the most robust network.
b) It is the most secure network.
c) Easy to configure.
d) All the above.
Options:
What is the correct answer?
4
In which area we can expend a LAN network?
A. We can expend a LAN network within the city
B. We can expend a LAN within an organization only
C. We can expend a LAN network within the country
D. We can expend a LAN network all over the world
What is the correct answer?
4
Which of the following number is assigned for IPv4 in the protocol type field of ARP message format?
What is the correct answer?
4
In which topology all devices are connected with a single backbone cable?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about STAR network topologies in computer networks?
A. In the STAR topology all devices in a network are connected to a central device
B. In the STAR topology all devices in a network are connected to each other
C. In the STAR topology there is no need to required physical cable
What is the correct answer?
4
Which of the following error code is used for Bad Request in HTTP protocol?
What is the correct answer?
4
There are the following statements that are given below, which of them are the disadvantages of FTP protocol?
a) All FTP providers do not provide encrypted transfer of files.
b) It does not allow simultaneous transfers with multiple receivers.
c) We cannot send a very large file due to the size limit.
d) FTP is not supported in Linux operating system.
Options:
What is the correct answer?
4
SNMP stands for?
A. Simple Network Message Protocol
B. Secure Network Message Protocol
C. Simple Network Management Protocol
D. Secure Network Management Protocol
What is the correct answer?
4
What is the full form of BSS?
A. Base Station Subsystem
What is the correct answer?
4
There are following statements that are given below, which of them are correct about email addresses?
a) E-mail addresses are case sensitive.
b) E-mail address contains the domain name and user name.
c) In the e-mail address, the user name and domain name are separated by the dollar symbol.
d) E-mail addresses cannot be duplicated.
Options:
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about the computer network?
A. A computer network is an interconnection between multiple devices to share hardware resources and information.
B. A computer network is an interconnection between multiple devices to share hardware resources only.
C. Computer network is an interconnection between multiple devices to share only information among all devices.
What is the correct answer?
4
There are the following options that are given below, which of them are correct functionalities of the router?
A. Internetwork communication
C. Selection of best route
What is the correct answer?
4
Which of the following protocols are used with HTTPS for security mechanism?
What is the correct answer?
4
Which default port is used for FTP?
What is the correct answer?
4
In which year the telnet protocol was developed?
What is the correct answer?
4
There are the following RFC numbers given below which is related HTTPS?
What is the correct answer?
4
What is the full form of IEEE?
A. International Electronics and Electrical Engineers
B. International Electrical and Electronics Engineers
C. Institute of Electrical and Electronics Engineers
D. Institute of Electronics and Electrical Engineers
What is the correct answer?
4
How many bytes are used in IPv4 addresses?
What is the correct answer?
4
What is the full form of TNFS?
A. Trivial Network File System
B. Triple Network File System
C. Trusted Network File System
D. Temporary Network File System