Home
Current Affairs January 2024

What is the correct answer?

4

There are the following statements that are given below, which of them are the advantages of FTP protocol?
a) Using FTP file transfer is very fast.
b) Using FTP, we can access the FTP server in a secure manner.
c) FTP is a very efficient protocol for transferring a file.
d) FTP provides back and forth movement.
Options:

A. A and B

B. B and C

C. A, B, and C

D. A, B, C, and D

Correct Answer :

D. A, B, C, and D


Related Questions

What is the correct answer?

4

URL stands for?

A. Universal Resource Locator

B. Universal Reserve Location

C. Ultimate Resource Locator

D. Uniform Resource Locator

What is the correct answer?

4

What is the default port for HTTP?

A. 80

B. 443

C. 15001

D. None of the above

What is the correct answer?

4

Which of the following types of VLAN can be implemented?
a) Tagged VLAN
b) Untagged VLAN
c) Absolute VLAN
d) Pacific VLAN
Options:

A. A and B

B. C and D

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

How many cables are required when N devices are connected with HUB in STAR topology?

A. N-1

B. N+1

C. N

D. N+2

What is the correct answer?

4

There are following options that are given below, where can we use full-duplex?
a) Switch to Switch
b) Host to Host
c) Hub to Hub
d) Switch to host
Options:

A. A, B and D

B. A and B only

C. A and D only

D. Only C

What is the correct answer?

4

Which layer of the OSI model is responsible for encryption and decryption?

A. Session Layer

B. Network Layer

C. Presentation Layer

D. Transport Layer

What is the correct answer?

4

Which of the following are correct commands used in the POP protocol?
a) STAT
b) LIST
c) DELETE
d) RSET
Options:

A. A and B

B. A and C

C. A, B, and D

D. D

What is the correct answer?

4

Which layer of the OSI model is responsible for routing?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

Which default port is used for SSL based IMAP?

A. 553

B. 443

C. 143

D. 993

What is the correct answer?

4

In which area we can expend a LAN network?

A. We can expend a LAN network within the city

B. We can expend a LAN within an organization only

C. We can expend a LAN network within the country

D. We can expend a LAN network all over the world

What is the correct answer?

4

Which of the following standard defines the format of an SSL certificate?

A. X.506

B. X.507

C. X.508

D. X.509

What is the correct answer?

4

Which command is used to initiate the SMTP conversation?

A. EHELLO

B. CHELLO

C. HELLO

D. HELLOMAIL

What is the correct answer?

4

Which default port is used for DNS Service?

A. 53

B. 54

C. 55

D. 56

What is the correct answer?

4

There are the following options that are given below, which is not the type of flow control?

A. Congestion avoidance

B. Windowing

C. Cut-through

D. Buffering

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about network topologies in computer networks?

A. The network topologies describe, how nodes or hosts are corrected in a network

B. The physical and logical layouts are used to implement network topologies

C. Both of the above

D. None of the above

What is the correct answer?

4

GPRS stands for?

A. Global Processing Reserved Services

B. General Packet Radio System

C. Global Packet Radio System

D. Global Packet Radio Services

What is the correct answer?

4

Which default port is used for SSL based LDAP?

A. 636

B. 536

C. 436

D. 389

What is the correct answer?

4

Which layer of the OSI model is responsible for compression?

A. Session Layer

B. Network Layer

C. Presentation Layer

D. Transport Layer

What is the correct answer?

4

Which of the following applications are used for remote login in the Linux operating system?
a) RealVNC
b) Remmina
c) NoMachine
d) TeamViewer
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

Which of the following protocols are used for remote login?
a) telnet
b) ssh
c) ftp
d) scp
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

There are following statements that are given below, which of them are correct about email addresses?
a) E-mail addresses are case sensitive.
b) E-mail address contains the domain name and user name.
c) In the e-mail address, the user name and domain name are separated by the dollar symbol.
d) E-mail addresses cannot be duplicated.
Options:

A. A and B

B. B and D

C. A, B, and C

D. A, B, and D

What is the correct answer?

4

SSH stands for?

A. Secure Shell

B. Server Shell

C. Simple Shell

D. Software Shell

What is the correct answer?

4

What do you understand about logical layout in network topologies?

A. The logical layout describes the physical placements of network devices

B. The logical layout describes the flow of data within the network

C. The logical layout that describes cables only used in the network

D. All the above

What is the correct answer?

4

Which of the following protocol(s) is/are used by IEEE 802.11 standards?

A. CSMA/CA

B. CSMA/CD

C. Both

D. None

What is the correct answer?

4

Which of the following types of connections are used in FTP?
a) Control connection
b) Data connection
c) Database connection
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which of the following are application layer protocols?

A. FTP

B. HTTP

C. SNMP

D. All of the above

What is the correct answer?

4

Which of the following are the processes of the GPRS network?
a) Attach Process
b) Detach Process
c) Authentication process
d) PDP activation process
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which transmission mode is supported in the WiFi network?

A. Simplex

B. Half-duplex

C. Full duplex

D. None of the above

What is the correct answer?

4

Which default port is used for Redis Server?

A. 3379

B. 4379

C. 5379

D. 6379

What is the correct answer?

4

CDMA stands for?

A. Customer Division Multiple Access

B. Cost Division Multiple Access

C. Cost Derived Multiple Access

D. Code Division Multiple Access