Home
Current Affairs January 2024

What is the correct answer?

4

UDP operates on which layer of the OSI model?

A. Network layer

B. Transport layer

C. Presentation layer

D. Application layer

Correct Answer :

B. Transport layer


Related Questions

What is the correct answer?

4

Which layer of the OSI model is responsible for segmentation and reassembly?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

Which of the following are the states of MS in the GPRS system?
a) Idle state
b) Active state
c) Standby state
d) All of the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about Native VLAN?
a) Native VLAN is used for backward compatibility with old devices that don’t support VLAN.
b) In the native VLAN, frames are not tagged when sent to the trunk links.
c) Native VLAN is used in mobile devices.
d) All of the above
Options:

A. A and B

B. B and C

C. A and C

D. D

What is the correct answer?

4

The NPL network is operated by?

A. Next Physical Laboratory

B. National Physical Laboratory

C. Nexon Physical Laboratory

D. Nexon Physical Library

What is the correct answer?

4

There are the following statements that are given below, which of them are correct ARP?
a) The ARP protocol is used to get destination MAC address from the destination IP address.
b) The ARP protocol is used to get the destination IP address from the destination MAC address.
c) The ARP stands for Address Resolution Protocol.
d) The ARP protocol works on the same network as well as connected networks.
Options:

A. A and C

B. A and B

C. A, C and D

D. B, C, and D

What is the correct answer?

4

There are the following statements that are given below, what are the disadvantages of BUS topology in a computer network.
a) If the main cable is damaged then the complete network will not work.
b) Network disturbance occurs when we add or remove a device into a network.
c) Performance gets decreased when a new node is added to the network.
d) There is a security issue because every node in the network can access the data for other nodes.
Options:

A. A and B

B. B and C

C. C and D

D. A, B, C, and, D

What is the correct answer?

4

There are the following options that are given below, which of them are part of the IEEE Ethernet frame header?
a) FCS field
b) Network addresses
c) Mac addresses
d) Network and Mac addresses
Options:

A. Only A

B. Only B

C. A and B

D. A and C

What is the correct answer?

4

Which of the following are application layer protocols?

A. TCP

B. UDP

C. Both of the above

D. None of the above

What is the correct answer?

4

Which default port is used for Oracle Listener?

A. 1521

B. 2135

C. 1531

D. None of the above

What is the correct answer?

4

There are following statements that are given below, which statement correctly defines half duplex?

A. In a half-duplex system, during communication only devices can send information at a time.

B. In half a duplex system, during communication both devices can send or receive information simultaneously.

C. In a half-duplex system, during communication one device can send information and another device can receive.

D. None of the above.

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about GPRS?
a) The GRPS stands for General Packet Radio Service.
b) The GPRS is a mobile data service used in mobile phones.
c) It is a packet-switched network that can be used by multiple users to transmit data using the same transmission channel.
d) GPRS is also known as GSM-IP.
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are the following options that are given below, which of them are correct parameters of HTTP?
a) HTTP version
b) URI
c) Space locator
d) Product tokens
Options:

A. A and B

B. C and D

C. A, B, and D

D. A, B, C, and D

What is the correct answer?

4

How many bytes are used in IPv4 addresses?

A. 4

B. 8

C. 16

D. 32

What is the correct answer?

4

There are the following RFC numbers given below which is related HTTPS?

A. RFC 2815

B. RFC 2818

C. RFC 2821

D. RFC 2854

What is the correct answer?

4

Which of the following are parts of the ARP message format?
a) Hardware Type
b) Sender Hardware Address
c) OP code
d) Sender Protocol Address
Options:

A. A and B

B. C and D

C. A, B, and D

D. A, B, C, and D

What is the correct answer?

4

What is used for '$' for URL encoding?

A. %24

B. %25

C. %26

D. %27

What is the correct answer?

4

NetBIOS stands for?

A. Network Basic Input Output Server

B. Network Basic Input Output System

C. Network Basic Input Output Service

D. Next Basic Input Output Server

What is the correct answer?

4

There are the following statements that are given below, what are the advantages of MESH topology in a computer network.
a) It is the most robust network.
b) It is the most secure network.
c) Easy to configure.
d) All the above.
Options:

A. D

B. A and B

C. C

D. A, B, and C

What is the correct answer?

4

SSHFS stands for?

A. Secure Shell File Server

B. Secure Shell File Software

C. Secure Shell Film Server

D. Secure Shell File System

What is the correct answer?

4

What is the maximum size limit of the file that can be transferred using the FTP protocol?

A. 1GB approx

B. 2GB approx

C. 4GB approx

D. 8GB approx

What is the correct answer?

4

Which of the following command is used to generate SSH keys in the Linux operating system?

A. keygen-ssh

B. ssh-keygen

C. ssh-key

D. ssk-genkey

What is the correct answer?

4

What are the core components of the email system?
a) Email client
b) Email server
c) Internet service provider
d) All the above
Options:

A. A and B

B. B and D

C. A and C

D. D

What is the correct answer?

4

Which of the following are not correct types of network topologies in computer networks?

A. Star

B. Ring

C. Hybrid

D. None of the above

What is the correct answer?

4

Which of the following is the correct frequency of the IEEE 802.11g standard?

A. 3.1 GHz

B. 3.5 GHz

C. 2.4 GHz

D. 4.0 GHz

What is the correct answer?

4

In which year SSH was developed?

A. 1990

B. 1992

C. 1995

D. 1998

What is the correct answer?

4

How many layers used in the OSI model?

A. 5

B. 6

C. 7

D. 8

What is the correct answer?

4

There are the following options that are given below, which of them are correct about URL encoding in HTTP?

A. URL encoding is used to replace some unsafe characters with specific characters in the URL.

B. URL encoding is used to encrypt data send in URL

C. URL encoding is used to encrypt complete URL

D. None of the above

What is the correct answer?

4

What is OWL in the context of WWW?

A. OWL is a semantic web language.

B. OWL is a web server.

C. OWL is a web browser using in Linux Operating System

D. None of the above

What is the correct answer?

4

The ARP protocol operates on which layer of the OSI model?

A. Physical Layer

B. Network Layer

C. Session Layer

D. Application

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about VLAN Tagging?
a) The VLAN tagging is used to handle more than one VLAN on a port.
b) VLAN tagging can be performed by putting VLAN ID into the header to identify the network.
c) VLAN tagging is also known as VLAN trunking.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D