Related Questions
What is the correct answer?
4
Which of the following protocol is used to broadcast MAC address to the entire network when a computer boots up?
What is the correct answer?
4
Which of the following are correct IEEE 802.11 network PHY standards?
a) 11a
b) 11b
c) 11p
d) 11y
Options:
What is the correct answer?
4
Where is CATENET used in internetworking?
A. The CATENET is not used in internetworking
B. The CATENET is a type of cable used in internetworking
C. The CATENET is used for packet switching communication in internetworking
What is the correct answer?
4
In which topology all devices are connected with a single backbone cable?
What is the correct answer?
4
What is the full form of BSC in GSM network?
A. Base Service Communication
B. Basic Service Communication
C. Base System Controller
D. Base Station Controller
What is the correct answer?
4
Which of the following RFC numbers are related to POP?
a) RFC 918
b) RFC 937
c) RFC 1081
d) RFC 1939
Options:
What is the correct answer?
4
VIRUS stands for?
A. Visual Information Resources Under Seized
B. Vital Information Resources Under Server
C. Vital Information Resources Under Seized
D. Vital Information Resources Unified Seized
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about the WiFi hotspot?
a) A WiFi hotspot is an area where devices like computers, mobile can access internet connection.
b) A WiFi hotspot can be created by installing a WiFi Access Point.
c) A WiFi access point can transmit signals in a limited area, know as the WiFi hotspot area.
d) All of the above
Options:
What is the correct answer?
4
WLAN stands for?
A. Wireless Local Area Network
B. World Line Area Network
C. World Line Access Network
D. Wireless Local Access Network
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about Native VLAN?
a) Native VLAN is used for backward compatibility with old devices that don’t support VLAN.
b) In the native VLAN, frames are not tagged when sent to the trunk links.
c) Native VLAN is used in mobile devices.
d) All of the above
Options:
What is the correct answer?
4
There are the following statements that are given below, what are the advantages of MESH topology in a computer network.
a) It is the most robust network.
b) It is the most secure network.
c) Easy to configure.
d) All the above.
Options:
What is the correct answer?
4
DCCP stands for?
A. Datagram Congestion Control Protocol
B. Data Control Congestion Protocol
C. Datagram Control Congestion Protocol
D. Dynamic Congestion Control Protocol
What is the correct answer?
4
Which of the following configuration file is used for SSH in the Linux operating system?
What is the correct answer?
4
Which default port is used for Microsoft RDP?
What is the correct answer?
4
The NPL network is operated by?
A. Next Physical Laboratory
B. National Physical Laboratory
C. Nexon Physical Laboratory
D. Nexon Physical Library
What is the correct answer?
4
What is used for '$' for URL encoding?
What is the correct answer?
4
There are the following options that are given below, which of them are correct types of computer networks?
What is the correct answer?
4
Which default port is used for MySql Server?
What is the correct answer?
4
Which of the following is responsible for allocating radio resources to the mobile calls?
What is the correct answer?
4
What is a collision in networking?
A. A collision is a result when two or more devices send data at a time through a single channel.
B. A collision is a process of sending data between two or more devices in wired mode.
C. A collision is a process of sending data between two or more devices in wireless mode.
What is the correct answer?
4
Which of the following are valid formats of SSL certificates?
a) PEM
b) DER
c) PKCS#7
d) PKCS#25
Options:
What is the correct answer?
4
What is the full form of WSM?
A. WiFi Scheduled Multimedia
B. Wireless Scheduled Multimedia
C. Wireless Scheduled Media
What is the correct answer?
4
POP3 stands for?
A. Presentation Operational Protocol version 3
B. Post Office Protocol version 3
C. Post Operational Protocol version 3
D. Pre Office Protocol version 3
What is the correct answer?
4
Which google service is used for URL shortening?
What is the correct answer?
4
What is the default port for DB2 database server?
What is the correct answer?
4
Which command is used to terminate the SMTP connection?
What is the correct answer?
4
Why Entity Tags are used in HTTP?
a) It is used to tag each item in the request created by the client.
b) It is used to compare two or more entities from the same requested resource.
c) It is used to download HTML documents.
d) It is used to download CSS documents.
Options:
What is the correct answer?
4
What the first inter-connected network is?
What is the correct answer?
4
There are the following options that are given below, which of them an IEEE standard is used in Frame tagging?
What is the correct answer?
4
Which default port is used for Jetty?