Home
Current Affairs January 2024

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about DNS in computer networks?

A. A DNS is a server which is used to convert web address or a URL into the corresponding IP address

B. A DNS is used to send or upload a data file to the server

C. A DNS is used to download the data file from the server

D. A DNS server is used to save data files into computer memory

Correct Answer :

A. A DNS is a server which is used to convert web address or a URL into the corresponding IP address


Related Questions

What is the correct answer?

4

Which of the following protocols are used with HTTPS for security mechanism?

A. SSL

B. TLS

C. Both

D. None

What is the correct answer?

4

What is the full form of SSTP protocol?

A. Secure Socket Tunneling Protocol

B. Secure Service Tunneling Protocol

C. Secure Server Tunneling Protocol

D. Secure Saver Tunneling Protocol

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about radio signals in WiFi communication?

A. Radio signals are transmitted by WiFi Antenna and received by WiFi receivers within the range of WiFI.

B. WiFi cards are used to read the WiFi signal and create connectivity between user and network.

C. Both of the above

D. None of the above

What is the correct answer?

4

Which of the following Certificate Authority provides a free DV SSL certificate?

A. Symantec

B. DigiCert

C. Let's Encrypt

D. GlobalSign

What is the correct answer?

4

Which version of TLS removed the support for MD5 and SHA-224?

A. TLS 1.0

B. TLS 1.1

C. TLS 1.2

D. TLS 1.3

What is the correct answer?

4

WBMP stands for?

A. Wireless Bitmap image

B. Wired Bitmap image

C. Worst Bitmap image

D. Worlds Bitmap image

What is the correct answer?

4

Which of the following are the parts of the HTTP response?
a) Status
b) Message Body
c) The encryption key used for HTTP protocol security
d) Header fields for a response
Options:

A. A and B

B. B and D

C. B, C, and D

D. A, B, and D

What is the correct answer?

4

There are the following RFC numbers are given below, which of them are related to HTTP?
a) RFC 2616
b) RFC 3616
c) RFC 7230
d) RFC 7231
Options:

A. A and B

B. A, C, and D

C. A, B, and C

D. B, C, and D

What is the correct answer?

4

IMAP stands for?

A. Invoice Mail Access Protocol

B. Internet Mail Access Protocol

C. Internal Mail Access Protocol

D. International Mail Access Protocol

What is the correct answer?

4

How many bytes are reserved for target hardware address in ARP message format?

A. 4 bytes

B. 6 bytes

C. 8 bytes

D. 16 bytes

What is the correct answer?

4

Which of the following countries does not legalize the VPN implementation?
a) China
b) UAE
c) Iraq
d) North Korea
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

Which default port is used for LDAP?

A. 636

B. 536

C. 436

D. 389

What is the correct answer?

4

Which default port is used for FTP?

A. 8090

B. 25

C. 21

D. 35

What is the correct answer?

4

RARP stands for?

A. Reserve Address Resolution Protocol

B. Reverse Address Resolution Protocol

C. Revert Address Resolution Protocol

D. Responsive Address Resolution Protocol

What is the correct answer?

4

What is the full form of MTA used in SMTP?

A. Mail Time Association

B. Mail Trim Agent

C. Mail Transmission Agent

D. Mail Transfer Agent

What is the correct answer?

4

OSI stands for?

A. Open System International

B. Open System Interconnection

C. Open Server Interconnection

D. Open Server International

What is the correct answer?

4

Which of the following are functions of the application layer?

A. Mail Services

B. File Transfer

C. Virtual terminals

D. All of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about HYBRID topology in computer networks?

A. In the HYBRID topology all devices in a network are connected to a central device

B. The HYBRID topology is the combination of any two network topologies

C. In the HYBRID topology there is no need to required physical cable

D. None of the above

What is the correct answer?

4

Which of the following types of connections are used in FTP?
a) Control connection
b) Data connection
c) Database connection
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about remote login?
a) Remote login is a mechanism that is used to access the computer which is located in a different location using remote login protocols.
b) Using remote login we can access the computer through the command line only.
c) Now a day's remote login is very popular for remote support in almost all companies.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which of the following are application layer protocols?

A. FTP

B. HTTP

C. SNMP

D. All of the above

What is the correct answer?

4

What is the full form of ETSI?

A. European Telegraph Standard Institute

B. European Telecommunications Standard Institute

C. Eastern Telephonic Standard Institute

D. European Telephonic Standard Institute

What is the correct answer?

4

There are following statements that are given below, which of them are correct about emails?
a) E-mail stands for Electronic Mail.
b) E-mail is used for sending and receiving text, images, and video files.
c) E-mail is also used for identity in the internet world.
d) E-mails are not secured enough for data transmission.
Options:

A. A and B

B. B and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

Which part of the URL describes the protocol used in a URL?

A. Scheme

B. Host Address

C. File Path

D. None of the above

What is the correct answer?

4

Which of the following are the main components of NFS architecture?
a) RPC
b) XDR
c) NFS procedures and Operations
d) All of the above
Options:

A. A and B

B. A and C

C. B and CC

D. D

What is the correct answer?

4

There are the following statements that are given below, which is correct about file:// scheme?

A. It is used to indicate that the file is on the local hard disk.

B. It is used to indicate that the file is on the shared folder of the local LAN.

C. Both of the above

D. None of the above

What is the correct answer?

4

What is the full form of IEEE?

A. International Electronics and Electrical Engineers

B. International Electrical and Electronics Engineers

C. Institute of Electrical and Electronics Engineers

D. Institute of Electronics and Electrical Engineers

What is the correct answer?

4

Which protocol is used to provide functionalities of ARP for IPv6 addresses?

A. RARP

B. IARP

C. Neighbor Discovery Protocol

D. None of the Above

What is the correct answer?

4

What is the full form of TNFS?

A. Trivial Network File System

B. Triple Network File System

C. Trusted Network File System

D. Temporary Network File System

What is the correct answer?

4

A SSL certificate is also known as?

A. Security Certificate

B. Privacy Certificate

C. Digital Certificate

D. Cryptology Certificate