Home
Current Affairs January 2024

What is the correct answer?

4

There are the following statements that are given below, which of them are the disadvantages of FTP protocol?
a) All FTP providers do not provide encrypted transfer of files.
b) It does not allow simultaneous transfers with multiple receivers.
c) We cannot send a very large file due to the size limit.
d) FTP is not supported in Linux operating system.
Options:

A. A and B

B. B and C

C. A, B, and C

D. A, B, C, and D

Correct Answer :

C. A, B, and C


Related Questions

What is the correct answer?

4

Which of the following protocols are used as a replacement of RARP?
a) DNS
b) Inverse ARP
c) BOOTP
d) DHCP
Options:

A. A and B

B. C and D

C. A, B and D

D. A, B, and C

What is the correct answer?

4

DHCP stands for?

A. Double Host Committed Protocol

B. Dynamic Host Common Protocol

C. Dynamic Hyper Common Protocol

D. Dynamic Host Configuration Protocol

What is the correct answer?

4

Which of the following are the parts of VPN logs?
a) User activities
b) Devices used
c) IP addresses
d) Connection and disconnection timestamps
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following is not the component of the SMTP protocol?

A. Mail Transfer Agent

B. User Agent

C. Server Agent

D. None of the above

What is the correct answer?

4

Which of the following is not part of the format of the SSL certificate?

A. Signature algorithm

B. Public Key

C. Encrypted Text

D. Name of Issuer

What is the correct answer?

4

Which of the following options are used for file sharing in /etc/exports file in the Redhat Linux?
a) ro
b) rw
c) no_subtree_check
d) no_root_squash
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which utility command is used for FTP in the Linux operating system?

A. FTP

B. ftp

C. linuxftp

D. LinuxFtp

What is the correct answer?

4

Who was developed FTP?

A. Bill gates

B. Abhay bhushan

C. H C Verma

D. Manindra agrawal

What is the correct answer?

4

Which of the following protocol is used to broadcast MAC address to the entire network when a computer boots up?

A. Inverse ARP

B. Proxy ARP

C. Gratuitous ARP

D. Serial Line ARP

What is the correct answer?

4

Which of the following network devices are operated at the physical layer of the OSI model?

A. Hub

B. Repeater

C. Modems

D. All the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about remote login?
a) Remote login is a mechanism that is used to access the computer which is located in a different location using remote login protocols.
b) Using remote login we can access the computer through the command line only.
c) Now a day's remote login is very popular for remote support in almost all companies.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

There are the following statements that are given below, what are the advantages of MESH topology in a computer network.
a) It is the most robust network.
b) It is the most secure network.
c) Easy to configure.
d) All the above.
Options:

A. D

B. A and B

C. C

D. A, B, and C

What is the correct answer?

4

In which area we can expend a LAN network?

A. We can expend a LAN network within the city

B. We can expend a LAN within an organization only

C. We can expend a LAN network within the country

D. We can expend a LAN network all over the world

What is the correct answer?

4

Which of the following number is assigned for IPv4 in the protocol type field of ARP message format?

A. 0x400

B. 0x800

C. 0x100

D. 0x200

What is the correct answer?

4

In which topology all devices are connected with a single backbone cable?

A. Star

B. Mesh

C. Bus

D. Ring

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about STAR network topologies in computer networks?

A. In the STAR topology all devices in a network are connected to a central device

B. In the STAR topology all devices in a network are connected to each other

C. In the STAR topology there is no need to required physical cable

D. None of the above

What is the correct answer?

4

Which of the following error code is used for Bad Request in HTTP protocol?

A. 200

B. 300

C. 400

D. 500

What is the correct answer?

4

There are the following statements that are given below, which of them are the disadvantages of FTP protocol?
a) All FTP providers do not provide encrypted transfer of files.
b) It does not allow simultaneous transfers with multiple receivers.
c) We cannot send a very large file due to the size limit.
d) FTP is not supported in Linux operating system.
Options:

A. A and B

B. B and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

SNMP stands for?

A. Simple Network Message Protocol

B. Secure Network Message Protocol

C. Simple Network Management Protocol

D. Secure Network Management Protocol

What is the correct answer?

4

What is the full form of BSS?

A. Base Station Subsystem

B. Base Service Station

C. Base System Services

D. Basic System Services

What is the correct answer?

4

There are following statements that are given below, which of them are correct about email addresses?
a) E-mail addresses are case sensitive.
b) E-mail address contains the domain name and user name.
c) In the e-mail address, the user name and domain name are separated by the dollar symbol.
d) E-mail addresses cannot be duplicated.
Options:

A. A and B

B. B and D

C. A, B, and C

D. A, B, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the computer network?

A. A computer network is an interconnection between multiple devices to share hardware resources and information.

B. A computer network is an interconnection between multiple devices to share hardware resources only.

C. Computer network is an interconnection between multiple devices to share only information among all devices.

D. None of the above

What is the correct answer?

4

There are the following options that are given below, which of them are correct functionalities of the router?

A. Internetwork communication

B. Packet switching

C. Selection of best route

D. All of the above

What is the correct answer?

4

Which of the following protocols are used with HTTPS for security mechanism?

A. SSL

B. TLS

C. Both

D. None

What is the correct answer?

4

Which default port is used for FTP?

A. 8090

B. 25

C. 21

D. 35

What is the correct answer?

4

In which year the telnet protocol was developed?

A. 1965

B. 1969

C. 1972

D. 1988

What is the correct answer?

4

There are the following RFC numbers given below which is related HTTPS?

A. RFC 2815

B. RFC 2818

C. RFC 2821

D. RFC 2854

What is the correct answer?

4

What is the full form of IEEE?

A. International Electronics and Electrical Engineers

B. International Electrical and Electronics Engineers

C. Institute of Electrical and Electronics Engineers

D. Institute of Electronics and Electrical Engineers

What is the correct answer?

4

How many bytes are used in IPv4 addresses?

A. 4

B. 8

C. 16

D. 32

What is the correct answer?

4

What is the full form of TNFS?

A. Trivial Network File System

B. Triple Network File System

C. Trusted Network File System

D. Temporary Network File System