Home
Current Affairs January 2024

What is the correct answer?

4

What do you understand about the physical layout in network topologies?

A. The physical layout that describes the physical placements of network devices

B. The physical layout describes the flow of data within the network

C. The physical layout that describes cables only used in the network

D. All the above

Correct Answer :

A. The physical layout that describes the physical placements of network devices


Related Questions

What is the correct answer?

4

Which of the following command is used to generate SSH keys in the Linux operating system?

A. keygen-ssh

B. ssh-keygen

C. ssh-key

D. ssk-genkey

What is the correct answer?

4

IP stands for?

A. Internet Protocol

B. International Protocol

C. Invert Protocol

D. Invoice Protocol

What is the correct answer?

4

What is the full form of TFTP?

A. Transport File Transfer Protocol

B. Tree File Transfer Protocol

C. Trivial File Transfer Protocol

D. Trim File Transfer Protocol

What is the correct answer?

4

Which of the following is the correct bandwidth of the IEEE 802.11b standard?

A. 22 MHz

B. 20 MHz

C. 30 MHz

D. 25 MHz

What is the correct answer?

4

In which network topology all hosts are connected to each other in a network?

A. Star

B. Ring

C. Hybrid

D. Mesh

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about UDP in networking?
a) UDP stands for User Data Protocol.
b) UDP is a network layer protocol.
c) UDP is stateless.
d) All of the above
Options:

A. A and C

B. A and B

C. B and C

D. D

What is the correct answer?

4

Which transmission mode is supported in the WiFi network?

A. Simplex

B. Half-duplex

C. Full duplex

D. None of the above

What is the correct answer?

4

What is the maximum number for a port number in computer networks?

A. 1024

B. 32767

C. 65535

D. 65536

What is the correct answer?

4

There are following statements that are given below, which of them are correct about VLAN in computer networks?

A. VLAN is a virtual LAN, it is used to share only files within created LAN

B. VLAN is a virtual LAN which is used to divide a single broadcast domain into multiple broadcast domains

C. VLAN is a virtual LAN, it is used to share only hardware resources within created LAN

D. None of the above

What is the correct answer?

4

HSDPA stands for?

A. Host Speed Downlink Packet Access

B. High Speed Downlink Packet Access

C. Host Speed Downloaded Packet Access

D. Host Speech Downlink Packet Access

What is the correct answer?

4

Which of the following parameters are used for GPRS billing?
a) Amount of data transferred
b) Free of charge
c) Flat monthly rate
d) Quality of service
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which layer of the OSI model is responsible for bit synchronization?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

What is the command is used to get an IP address from a URL in the windows operating system?

A. netstate

B. getipaddress

C. nslookup

D. nsipaddress

What is the correct answer?

4

Which of the following types of VLAN can be implemented?
a) Tagged VLAN
b) Untagged VLAN
c) Absolute VLAN
d) Pacific VLAN
Options:

A. A and B

B. C and D

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about VPN?
a) VPN stands for Virtual Private Network.
b) It is a technology that is used to create a secured connection over a less secured network.
c) Using the VPN, we can extend our private network using the internet.
d) All of the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which of the following are correct types of network topologies in computer networks?

A. Bus

B. Tree

C. Mesh

D. All of the above

What is the correct answer?

4

FTP stands for?

A. File Transport Protocol

B. File Transfer Protocol

C. Film Transfer Protocol

D. File Trigger Protocol

What is the correct answer?

4

There are the following statements that are given below, what are the disadvantages of BUS topology in a computer network.
a) If the main cable is damaged then the complete network will not work.
b) Network disturbance occurs when we add or remove a device into a network.
c) Performance gets decreased when a new node is added to the network.
d) There is a security issue because every node in the network can access the data for other nodes.
Options:

A. A and B

B. B and C

C. C and D

D. A, B, C, and, D

What is the correct answer?

4

There are the following methods that are given below, which of them are correct methods used in an HTTP request?
a) GET
b) POST
c) CONNECT
d) DELETE
Options:

A. A and B

B. A, B, and C

C. A, B, and D

D. A, B, C, and D

What is the correct answer?

4

The version number of HTTP contains?
a) Major number
b) Minor number
c) UID
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which default port is used for Jenkins?

A. 8080

B. 8090

C. 9082

D. None of the above

What is the correct answer?

4

Which of the following statements are the correct advantages of a VPN?
a) The destination cannot find your private network as a traffic origin.
b) Communication using VPN is done in an encrypted manner.
c) This is used to hide your identity to protect from hackers.
d) VPN implementation does not require any kind of server.
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

In which area we can expend a LAN network?

A. We can expend a LAN network within the city

B. We can expend a LAN within an organization only

C. We can expend a LAN network within the country

D. We can expend a LAN network all over the world

What is the correct answer?

4

What are the functions of the Certificate Management System?

A. It is used to store the certificate.

B. It is used to validate the certificate.

C. It is used to revoke certificates.

D. All of the above

What is the correct answer?

4

Which of the following service is responsible for mounting and un-mounting of the file system?

A. portmap

B. rpc.mountd

C. mountfile

D. mtfile

What is the correct answer?

4

Which of the following are correct commands used in IMAP protocol?
a) CREATE
b) DELETE
c) RENAME
d) NOOP
Options:

A. A and B

B. A and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about HYBRID topology in computer networks?

A. In the HYBRID topology all devices in a network are connected to a central device

B. The HYBRID topology is the combination of any two network topologies

C. In the HYBRID topology there is no need to required physical cable

D. None of the above

What is the correct answer?

4

What is the full form of QPSK?

A. Quality Phase Shift Keying

B. Quadric Phase Shift Keying

C. Quadrature Phase Shift Keying

D. Quad Phase Shift Keying

What is the correct answer?

4

Which of the following are parts of the ARP message format?
a) Hardware Type
b) Sender Hardware Address
c) OP code
d) Sender Protocol Address
Options:

A. A and B

B. C and D

C. A, B, and D

D. A, B, C, and D

What is the correct answer?

4

A URL can be?

A. Absolute URL

B. Relative URL

C. Both

D. None