Related Questions
What is the correct answer?
4
What is the full form of QPSK?
A. Quality Phase Shift Keying
B. Quadric Phase Shift Keying
C. Quadrature Phase Shift Keying
D. Quad Phase Shift Keying
What is the correct answer?
4
Which of the following correct problems in WiFi technology?
a) Backward Compatibility
b) Interoperability
c) Security issues
d) None of the above
Options:
What is the correct answer?
4
MAC stands for?
A. Most Accessible Controller
C. Mobile Access Communication
What is the correct answer?
4
Who was developed FTP?
What is the correct answer?
4
Which of the following number is assigned for IPv4 in the protocol type field of ARP message format?
What is the correct answer?
4
How many ports are required by a node to connect with HUB in STAR topology?
What is the correct answer?
4
Which cryptography mechanism is used SSL?
A. Symmetric cryptography
B. Asymmetric cryptography
What is the correct answer?
4
What is the full form of TFTP?
A. Transport File Transfer Protocol
B. Tree File Transfer Protocol
C. Trivial File Transfer Protocol
D. Trim File Transfer Protocol
What is the correct answer?
4
Which of the following command is used to generate SSH keys in the Linux operating system?
What is the correct answer?
4
Which of the following services are used for NFS in the Redhat Linux operating system?
a) nfs
b) portmap
c) mountd
d) None of the above
Options:
What is the correct answer?
4
Which of the following operating systems supports NFS?
a) Unix
b) Windows
c) Mac OS
d) Solaris
Options:
What is the correct answer?
4
In which year e-mail was invented?
What is the correct answer?
4
What is the default port for DB2 database server?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about UDP in networking?
a) UDP stands for User Data Protocol.
b) UDP is a network layer protocol.
c) UDP is stateless.
d) All of the above
Options:
What is the correct answer?
4
There are the following statements that are given below, which of them are correct advantages of VLAN?
a) Using VLAN, we can manage devices easily in the network.
b) We can create logical groups of devices on the basis of functions performed by them.
c) Using VLAN, we can reduce the size of broadcast domains.
d) VLAN allows us to add an additional layer of security.
Options:
What is the correct answer?
4
Which part of the URL describes the protocol used in a URL?
What is the correct answer?
4
In which year OSI model was developed?
What is the correct answer?
4
In which area we can expend a LAN network?
A. We can expend a LAN network within the city
B. We can expend a LAN within an organization only
C. We can expend a LAN network within the country
D. We can expend a LAN network all over the world
What is the correct answer?
4
There are the following options that are given below, which is the correct purpose of segmentation with the bridge?
A. Addition of broadcast domains
B. Addition of bandwidth for users
C. Addition of broadcast users
What is the correct answer?
4
Which of the following service is responsible for mounting and un-mounting of the file system?
What is the correct answer?
4
Which of the following RFC number is used for ARP?
What is the correct answer?
4
Which of the following is/are network device(s)?
What is the correct answer?
4
Which of the following are application layer protocols?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct ARP?
a) The ARP protocol is used to get destination MAC address from the destination IP address.
b) The ARP protocol is used to get the destination IP address from the destination MAC address.
c) The ARP stands for Address Resolution Protocol.
d) The ARP protocol works on the same network as well as connected networks.
Options:
What is the correct answer?
4
FTP works on which layer of the OSI model?
What is the correct answer?
4
Which of the following protocols are used as a replacement of RARP?
a) DNS
b) Inverse ARP
c) BOOTP
d) DHCP
Options:
What is the correct answer?
4
What is the full form of CSR related to the SSL Certificate?
A. Certificate Signing Request
B. Certificate Signal Response
C. Certificate Sample Resources
D. Certificate Sample Response
What is the correct answer?
4
SFTP stands for?
A. Simple File Transfer Protocol
B. Safe File Transfer Protocol
C. Safety File Transfer Protocol
D. Secure File Transfer Protocol
What is the correct answer?
4
Which of the following are the parts of VPN logs?
a) User activities
b) Devices used
c) IP addresses
d) Connection and disconnection timestamps
Options:
What is the correct answer?
4
A SSL certificate is also known as?
D. Cryptology Certificate