Home
Current Affairs January 2024

What is the correct answer?

4

What are the functions of the Certificate Management System?

A. It is used to store the certificate.

B. It is used to validate the certificate.

C. It is used to revoke certificates.

D. All of the above

Correct Answer :

D. All of the above


Related Questions

What is the correct answer?

4

What is the full form of LiFi?

A. Line Fidelity

B. Local Fidelity

C. Light Fidelity

D. Logical Fidelity

What is the correct answer?

4

What are the correct components of WWW?
a) URL
b) HTTP
c) DNS
d) Web Server
Options:

A. C and D

B. A and B

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following is the correct frequency of the IEEE 802.11g standard?

A. 3.1 GHz

B. 3.5 GHz

C. 2.4 GHz

D. 4.0 GHz

What is the correct answer?

4

Which layer of the OSI model is responsible for segmentation and reassembly?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

The version number of HTTP contains?
a) Major number
b) Minor number
c) UID
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

What do you understand about logical layout in network topologies?

A. The logical layout describes the physical placements of network devices

B. The logical layout describes the flow of data within the network

C. The logical layout that describes cables only used in the network

D. All the above

What is the correct answer?

4

What is the maximum number for a port number in computer networks?

A. 1024

B. 32767

C. 65535

D. 65536

What is the correct answer?

4

Which of the following are correct VPN protocols?
a) PPTP
b) L2TP
c) SSTP
d) OpenVPN
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following default port is used for TFTP?

A. 69

B. 65

C. 70

D. 71

What is the correct answer?

4

Which of the following remote login protocols are supported by the PuTTY application?
a) SSH
b) telnet
c) Rlogin
d) VNC
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about VPN?
a) VPN stands for Virtual Private Network.
b) It is a technology that is used to create a secured connection over a less secured network.
c) Using the VPN, we can extend our private network using the internet.
d) All of the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about WiFi?
a) WiFi is used to create a wireless network that provides broadband coverage in the local area.
b) WiFi stands for Wireless Fiction.
c) It is based on the IEEE 802.11 standard.
d) We can create a wireless network in the limit area using WiFi.
Options:

A. A and B

B. A and C

C. A, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following are correct commands used in the POP protocol?
a) STAT
b) LIST
c) DELETE
d) RSET
Options:

A. A and B

B. A and C

C. A, B, and D

D. D

What is the correct answer?

4

Who was invented VLAN?

A. W. David Sincoskie

B. Randy Bush

C. Kevin E. Bassler

D. Barry Wellman

What is the correct answer?

4

Which FTP response code is used for Bad sequence of commands?
a) DNS
b) Inverse ARP
c) BOOTP
d) DHCP
Options:

A. 501

B. 502

C. 503

D. 504

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about WebNFS?
a) The WebNFS is the extension of the NFS to access the file system over the internet.
b) This allows easy integration of NFS with a web browser.
c) This allows operations through the firewall.
d) All the above
Options:

A. A and B

B. A, and C

C. A, B, and C

D. D

What is the correct answer?

4

FM stands for?

A. First Module

B. Fiber Module

C. Frequency Modulation

D. Frequency Module

What is the correct answer?

4

There are following statements that are given below, which of them are correct about email addresses?
a) E-mail addresses are case sensitive.
b) E-mail address contains the domain name and user name.
c) In the e-mail address, the user name and domain name are separated by the dollar symbol.
d) E-mail addresses cannot be duplicated.
Options:

A. A and B

B. B and D

C. A, B, and C

D. A, B, and D

What is the correct answer?

4

In which area we can expend a WAN network?

A. We can expend a WAN network within the city

B. We can expend a WAN within an organization only

C. We can expend a WAN network within the country

D. We can expend a WAN network all over the world

What is the correct answer?

4

On which layer switch and bridge are operated?

A. Session Layer

B. Network Layer

C. Presentation Layer

D. Data Link Layer

What is the correct answer?

4

There are the following statements that are given below, which of them are correct Inverse ARP?
a) The Inverse ARP protocol is used to get the IP address from the MAC address.
b) It is the opposite of ARP.
c) The Inverse is used in only the Linux operating system.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

What is ARP spoofing?

A. ARP proxy request

B. RARP request

C. Inverse ARP request

D. Type of network attack

What is the correct answer?

4

Which of the following commands are used for NFS?
a) exportfs -v
b) exportfs -u
c) showmount -d
d) exportnfs - k
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

If N devices are connected in a MESH network, then how many dedicated links are required to them?

A. N

B. N+1

C. N(N+1)

D. N(N-1)/2

What is the correct answer?

4

UDP operates on which layer of the OSI model?

A. Network layer

B. Transport layer

C. Presentation layer

D. Application layer

What is the correct answer?

4

Which of the following daemons are used at the NFS server in the Linux operating system?
a) nfsd
b) rpcbind
c) mountd
d) kmpd
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

In which year TLS was introduced?

A. 1992

B. 1995

C. 1997

D. 1999

What is the correct answer?

4

Which of the following RFC numbers are related to telnet?
a) RFC 860
b) RFC 861
c) RFC 885
d) RFC 1073
Options:

A. A and B

B. A and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following service is responsible for mounting and un-mounting of the file system?

A. portmap

B. rpc.mountd

C. mountfile

D. mtfile

What is the correct answer?

4

In which year SSH was developed?

A. 1990

B. 1992

C. 1995

D. 1998