Related Questions
What is the correct answer?
4
Which of the following command is used to generate SSH keys in the Linux operating system?
What is the correct answer?
4
IP stands for?
B. International Protocol
What is the correct answer?
4
What is the full form of TFTP?
A. Transport File Transfer Protocol
B. Tree File Transfer Protocol
C. Trivial File Transfer Protocol
D. Trim File Transfer Protocol
What is the correct answer?
4
Which of the following is the correct bandwidth of the IEEE 802.11b standard?
What is the correct answer?
4
In which network topology all hosts are connected to each other in a network?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about UDP in networking?
a) UDP stands for User Data Protocol.
b) UDP is a network layer protocol.
c) UDP is stateless.
d) All of the above
Options:
What is the correct answer?
4
Which transmission mode is supported in the WiFi network?
What is the correct answer?
4
What is the maximum number for a port number in computer networks?
What is the correct answer?
4
There are following statements that are given below, which of them are correct about VLAN in computer networks?
A. VLAN is a virtual LAN, it is used to share only files within created LAN
B. VLAN is a virtual LAN which is used to divide a single broadcast domain into multiple broadcast domains
C. VLAN is a virtual LAN, it is used to share only hardware resources within created LAN
What is the correct answer?
4
HSDPA stands for?
A. Host Speed Downlink Packet Access
B. High Speed Downlink Packet Access
C. Host Speed Downloaded Packet Access
D. Host Speech Downlink Packet Access
What is the correct answer?
4
Which of the following parameters are used for GPRS billing?
a) Amount of data transferred
b) Free of charge
c) Flat monthly rate
d) Quality of service
Options:
What is the correct answer?
4
Which layer of the OSI model is responsible for bit synchronization?
What is the correct answer?
4
What is the command is used to get an IP address from a URL in the windows operating system?
What is the correct answer?
4
Which of the following types of VLAN can be implemented?
a) Tagged VLAN
b) Untagged VLAN
c) Absolute VLAN
d) Pacific VLAN
Options:
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about VPN?
a) VPN stands for Virtual Private Network.
b) It is a technology that is used to create a secured connection over a less secured network.
c) Using the VPN, we can extend our private network using the internet.
d) All of the above
Options:
What is the correct answer?
4
Which of the following are correct types of network topologies in computer networks?
What is the correct answer?
4
FTP stands for?
A. File Transport Protocol
B. File Transfer Protocol
C. Film Transfer Protocol
What is the correct answer?
4
There are the following statements that are given below, what are the disadvantages of BUS topology in a computer network.
a) If the main cable is damaged then the complete network will not work.
b) Network disturbance occurs when we add or remove a device into a network.
c) Performance gets decreased when a new node is added to the network.
d) There is a security issue because every node in the network can access the data for other nodes.
Options:
What is the correct answer?
4
There are the following methods that are given below, which of them are correct methods used in an HTTP request?
a) GET
b) POST
c) CONNECT
d) DELETE
Options:
What is the correct answer?
4
The version number of HTTP contains?
a) Major number
b) Minor number
c) UID
d) All the above
Options:
What is the correct answer?
4
Which default port is used for Jenkins?
What is the correct answer?
4
Which of the following statements are the correct advantages of a VPN?
a) The destination cannot find your private network as a traffic origin.
b) Communication using VPN is done in an encrypted manner.
c) This is used to hide your identity to protect from hackers.
d) VPN implementation does not require any kind of server.
Options:
What is the correct answer?
4
In which area we can expend a LAN network?
A. We can expend a LAN network within the city
B. We can expend a LAN within an organization only
C. We can expend a LAN network within the country
D. We can expend a LAN network all over the world
What is the correct answer?
4
What are the functions of the Certificate Management System?
A. It is used to store the certificate.
B. It is used to validate the certificate.
C. It is used to revoke certificates.
What is the correct answer?
4
Which of the following service is responsible for mounting and un-mounting of the file system?
What is the correct answer?
4
Which of the following are correct commands used in IMAP protocol?
a) CREATE
b) DELETE
c) RENAME
d) NOOP
Options:
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about HYBRID topology in computer networks?
A. In the HYBRID topology all devices in a network are connected to a central device
B. The HYBRID topology is the combination of any two network topologies
C. In the HYBRID topology there is no need to required physical cable
What is the correct answer?
4
What is the full form of QPSK?
A. Quality Phase Shift Keying
B. Quadric Phase Shift Keying
C. Quadrature Phase Shift Keying
D. Quad Phase Shift Keying
What is the correct answer?
4
Which of the following are parts of the ARP message format?
a) Hardware Type
b) Sender Hardware Address
c) OP code
d) Sender Protocol Address
Options:
What is the correct answer?
4
A URL can be?