Home
Current Affairs January 2024

What is the correct answer?

4

VIRUS stands for?

A. Visual Information Resources Under Seized

B. Vital Information Resources Under Server

C. Vital Information Resources Under Seized

D. Vital Information Resources Unified Seized

Correct Answer :

C. Vital Information Resources Under Seized


Related Questions

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about HTTP Caching?

A. HTTP caching is used to avoid sending HTTP requests many times for better performance.

B. HTTP caching is used to avoid sending HTTP full response many times for better performance.

C. Both of the above

D. None of the above

What is the correct answer?

4

MAC stands for?

A. Most Accessible Controller

B. Mobile Access Control

C. Mobile Access Communication

D. Media Access Control

What is the correct answer?

4

What is the command is used to get an IP address from a URL in the windows operating system?

A. netstate

B. getipaddress

C. nslookup

D. nsipaddress

What is the correct answer?

4

What is the default port for DB2 database server?

A. 10000

B. 20000

C. 35000

D. 50000

What is the correct answer?

4

There are following statements that are given below, which statement correctly define full duplex?

A. In a full-duplex system, during communication only devices can send information at a time.

B. In a full-duplex system, during communication both devices can send or receive information simultaneously.

C. In a full-duplex system, during communication one device can send information and another device can receive.

D. None of the above.

What is the correct answer?

4

Which of the following protocols are used as a replacement of RARP?
a) DNS
b) Inverse ARP
c) BOOTP
d) DHCP
Options:

A. A and B

B. C and D

C. A, B and D

D. A, B, and C

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about FTP?
a) FTP stands for File Transmission Protocol.
b) FTP is used to transfer files between clients and servers in the network.
c) FTP is a transport layer protocol.
d) FTP works with the command line as well as a graphical user interface.
Options:

A. A and B

B. B and C

C. B and D

D. A, B, and D

What is the correct answer?

4

Which of the following applications are used for remote login?
a) AnyDesk
b) TeamViewer
c) VNC connect
d) GoToMyPC
Options:

A. A and B

B. A and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

What is the full form of BSS?

A. Base Station Subsystem

B. Base Service Station

C. Base System Services

D. Basic System Services

What is the correct answer?

4

Which of the following are the types of HTTP messages?
a) HTTP header message
b) HTTP request message
c) HTTP response message
d) HTTP footer message
Options:

A. A and D

B. B and C

C. Only B

D. A, B, C, and D

What is the correct answer?

4

Which default port is used for LDAP?

A. 636

B. 536

C. 436

D. 389

What is the correct answer?

4

Which of the following are the types of HTTP header?
a) General header
b) Entity header
c) Request header
d) Response header
Options:

A. A, B, C and D

B. C and D

C. A, B, and C

D. A and B

What is the correct answer?

4

Which of the following are not valid email client software?
a) Microsoft Outlook
b) Thunderbird
c) eM Client
d) Mailbird
Options:

A. B

B. B and C

C. D

D. All are valid email client software

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about NFS?
a) The NFS is used to share file system resources over the network.
b) NFS stands for Network File system.
c) NFS is a client/server protocol where File system resources at the server and accessed by the clients.
d) NFS is not a client/ server protocol.
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about HTTP Messages?

A. HTTP messages are used to data CSS data from HTTP Server to the HTTP client.

B. HTTP messages are used to describe how data transferred between an HTTP client and an HTTP server.

C. Both of the above

D. None of the above

What is the correct answer?

4

Which of the following types of connections are used in FTP?
a) Control connection
b) Data connection
c) Database connection
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

What is ARP spoofing?

A. ARP proxy request

B. RARP request

C. Inverse ARP request

D. Type of network attack

What is the correct answer?

4

There are the following options that are given below, which of them are correct parameters of the UDP header?
a) Source Port number
b) Destination Port Number
c) Checksum
d) Flow control Flags
Options:

A. A and B

B. A, B, and C

C. A, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are the following options that are given below, which of them can be done through UDP?
a) Trace Route
b) Time Stamp
c) Record Route
d) All the above
Options:

A. A and B

B. B and C

C. A and C

D. D

What is the correct answer?

4

What do you understand about logical layout in network topologies?

A. The logical layout describes the physical placements of network devices

B. The logical layout describes the flow of data within the network

C. The logical layout that describes cables only used in the network

D. All the above

What is the correct answer?

4

Which of the following are correct IEEE 802.11 network PHY standards?
a) 11a
b) 11b
c) 11p
d) 11y
Options:

A. A and B

B. A , B, and C

C. A, B, and D

D. A, B, C, and, D

What is the correct answer?

4

What is the correct example of a WAN in computer networks?

A. Intranet

B. Extranet

C. Internet

D. None of the above

What is the correct answer?

4

In which area we can expend a WAN network?

A. We can expend a WAN network within the city

B. We can expend a WAN within an organization only

C. We can expend a WAN network within the country

D. We can expend a WAN network all over the world

What is the correct answer?

4

There are the following statements that are given below, which is correct about file:// scheme?

A. It is used to indicate that the file is on the local hard disk.

B. It is used to indicate that the file is on the shared folder of the local LAN.

C. Both of the above

D. None of the above

What is the correct answer?

4

What is the full form of CSMA/CA?

A. Carrier Sense Media Access with Collision Avoidance

B. Carrier Sense Multiple Access with Collision Avoidance

C. Carrier Sense Minimum Access with Collision Avoidance

D. Carrier Sense Maximum Access with Collision Avoidance

What is the correct answer?

4

In which year WiFi was introduced?

A. 1998

B. 2000

C. 2001

D. 2002

What is the correct answer?

4

There are the following options that are given below, which of them are correct directives of HTTP Cache request?
a) no-cache
b) max-state
c) min-fresh
d) only-if-cached
Options:

A. A and B

B. A, B, C, and D

C. C and D

D. A, B, and C

What is the correct answer?

4

What is the full form of TKIP?

A. Temporal Key Integrity Protocol

B. Temporary Key Integration Protocol

C. Template Key Internal Protocol

D. Temporary Key Internal Protocol

What is the correct answer?

4

VPN stands for?

A. Virtual Private Network

B. Visual Private Network

C. Visual Processing Network

D. Virtual Processing Network

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about UDP in networking?
a) UDP stands for User Data Protocol.
b) UDP is a network layer protocol.
c) UDP is stateless.
d) All of the above
Options:

A. A and C

B. A and B

C. B and C

D. D