Home
Current Affairs January 2024

What is the correct answer?

4

What an HTTP message contains?
a) Message Header
b) Message Type
c) Message Body
d) Message Length
Options:

A. A, C, and D

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

Correct Answer :

D. A, B, C, and D


Related Questions

What is the correct answer?

4

What is the full form of QPSK?

A. Quality Phase Shift Keying

B. Quadric Phase Shift Keying

C. Quadrature Phase Shift Keying

D. Quad Phase Shift Keying

What is the correct answer?

4

Which of the following correct problems in WiFi technology?
a) Backward Compatibility
b) Interoperability
c) Security issues
d) None of the above
Options:

A. A and B

B. A and C

C. A, B, and C

D. D

What is the correct answer?

4

MAC stands for?

A. Most Accessible Controller

B. Mobile Access Control

C. Mobile Access Communication

D. Media Access Control

What is the correct answer?

4

Who was developed FTP?

A. Bill gates

B. Abhay bhushan

C. H C Verma

D. Manindra agrawal

What is the correct answer?

4

Which of the following number is assigned for IPv4 in the protocol type field of ARP message format?

A. 0x400

B. 0x800

C. 0x100

D. 0x200

What is the correct answer?

4

How many ports are required by a node to connect with HUB in STAR topology?

A. 1

B. 2

C. 3

D. 4

What is the correct answer?

4

Which cryptography mechanism is used SSL?

A. Symmetric cryptography

B. Asymmetric cryptography

C. Both

D. None

What is the correct answer?

4

What is the full form of TFTP?

A. Transport File Transfer Protocol

B. Tree File Transfer Protocol

C. Trivial File Transfer Protocol

D. Trim File Transfer Protocol

What is the correct answer?

4

Which of the following command is used to generate SSH keys in the Linux operating system?

A. keygen-ssh

B. ssh-keygen

C. ssh-key

D. ssk-genkey

What is the correct answer?

4

Which of the following services are used for NFS in the Redhat Linux operating system?
a) nfs
b) portmap
c) mountd
d) None of the above
Options:

A. A and B

B. A, and C

C. A, B, and C

D. D

What is the correct answer?

4

Which of the following operating systems supports NFS?
a) Unix
b) Windows
c) Mac OS
d) Solaris
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

In which year e-mail was invented?

A. 1971

B. 1972

C. 1975

D. 1977

What is the correct answer?

4

What is the default port for DB2 database server?

A. 10000

B. 20000

C. 35000

D. 50000

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about UDP in networking?
a) UDP stands for User Data Protocol.
b) UDP is a network layer protocol.
c) UDP is stateless.
d) All of the above
Options:

A. A and C

B. A and B

C. B and C

D. D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct advantages of VLAN?
a) Using VLAN, we can manage devices easily in the network.
b) We can create logical groups of devices on the basis of functions performed by them.
c) Using VLAN, we can reduce the size of broadcast domains.
d) VLAN allows us to add an additional layer of security.
Options:

A. A and C

B. B and D

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

Which part of the URL describes the protocol used in a URL?

A. Scheme

B. Host Address

C. File Path

D. None of the above

What is the correct answer?

4

In which year OSI model was developed?

A. 1999

B. 1984

C. 1970

D. 2000

What is the correct answer?

4

In which area we can expend a LAN network?

A. We can expend a LAN network within the city

B. We can expend a LAN within an organization only

C. We can expend a LAN network within the country

D. We can expend a LAN network all over the world

What is the correct answer?

4

There are the following options that are given below, which is the correct purpose of segmentation with the bridge?

A. Addition of broadcast domains

B. Addition of bandwidth for users

C. Addition of broadcast users

D. None of the above

What is the correct answer?

4

Which of the following service is responsible for mounting and un-mounting of the file system?

A. portmap

B. rpc.mountd

C. mountfile

D. mtfile

What is the correct answer?

4

Which of the following RFC number is used for ARP?

A. RFC 826

B. RFC 829

C. RFC 834

D. RFC 835

What is the correct answer?

4

Which of the following is/are network device(s)?

A. Router

B. Hub

C. Switch

D. All the above

What is the correct answer?

4

Which of the following are application layer protocols?

A. TCP

B. UDP

C. Both of the above

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct ARP?
a) The ARP protocol is used to get destination MAC address from the destination IP address.
b) The ARP protocol is used to get the destination IP address from the destination MAC address.
c) The ARP stands for Address Resolution Protocol.
d) The ARP protocol works on the same network as well as connected networks.
Options:

A. A and C

B. A and B

C. A, C and D

D. B, C, and D

What is the correct answer?

4

FTP works on which layer of the OSI model?

A. Datalink layer

B. Network layer

C. Transport layer

D. Application layer

What is the correct answer?

4

Which of the following protocols are used as a replacement of RARP?
a) DNS
b) Inverse ARP
c) BOOTP
d) DHCP
Options:

A. A and B

B. C and D

C. A, B and D

D. A, B, and C

What is the correct answer?

4

What is the full form of CSR related to the SSL Certificate?

A. Certificate Signing Request

B. Certificate Signal Response

C. Certificate Sample Resources

D. Certificate Sample Response

What is the correct answer?

4

SFTP stands for?

A. Simple File Transfer Protocol

B. Safe File Transfer Protocol

C. Safety File Transfer Protocol

D. Secure File Transfer Protocol

What is the correct answer?

4

Which of the following are the parts of VPN logs?
a) User activities
b) Devices used
c) IP addresses
d) Connection and disconnection timestamps
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

A SSL certificate is also known as?

A. Security Certificate

B. Privacy Certificate

C. Digital Certificate

D. Cryptology Certificate