Home
Current Affairs January 2024

What is the correct answer?

4

What is a socket in computer networks?

A. A socket is network topology to manage a network of devices

B. A socket is the combination of IP address and port

C. A socket is a network line configuration

D. None of the above

Correct Answer :

B. A socket is the combination of IP address and port


Related Questions

What is the correct answer?

4

Which of the following is the correct bandwidth of the IEEE 802.11b standard?

A. 22 MHz

B. 20 MHz

C. 30 MHz

D. 25 MHz

What is the correct answer?

4

GSM stands for?

A. Global System for Mobile communication

B. Guest System for Mobile communication

C. Great System for Mobile communication

D. Global Server for Mobile communication

What is the correct answer?

4

Which default port is used for FTP?

A. 8090

B. 25

C. 21

D. 35

What is the correct answer?

4

Which layer of the OSI model is responsible for bit rate?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

Which of the following default port is used for TFTP?

A. 69

B. 65

C. 70

D. 71

What is the correct answer?

4

In which layer of TCP/IP model NFS operates?

A. Physical layer

B. Datalink layer

C. Application layer

D. A, B, C, and D

What is the correct answer?

4

What is the full form of UMTS?

A. Universal Mobile Telecommunication System

B. Unique Mobile Telecommunication System

C. Unique Mobile Transfer System

D. Universal Mobile Transfer System

What is the correct answer?

4

What is the full form of SFTP?

A. Simple File Transfer Protocol

B. Short File Transfer Protocol

C. Secure File Transfer Protocol

D. Scheduled File Transfer Protocol

What is the correct answer?

4

Which layer of the OSI model is responsible for connection-oriented services?

A. Session Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

WiFi stands for?

A. Wireless Frequency

B. Wireless Fidelity

C. Wireless Fiber

D. Wireless Fricson

What is the correct answer?

4

Which of the following protocols are used for remote login?
a) telnet
b) ssh
c) ftp
d) scp
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

There are following options that are given below, where can we use full-duplex?
a) Switch to Switch
b) Host to Host
c) Hub to Hub
d) Switch to host
Options:

A. A, B and D

B. A and B only

C. A and D only

D. Only C

What is the correct answer?

4

Which of the following service is responsible for mounting and un-mounting of the file system?

A. portmap

B. rpc.mountd

C. mountfile

D. mtfile

What is the correct answer?

4

Which of the following are application layer protocols?

A. FTP

B. HTTP

C. SNMP

D. All of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct statements about GPRS?
a) GPRS provides consistent IP services.
b) It provides wireless internet accesses over mobile phones.
c) GPRS uses the same infrastructure for different air interfaces.
d) GPRS is older technology; it does not use in the current scenario.
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Who was invented VLAN?

A. W. David Sincoskie

B. Randy Bush

C. Kevin E. Bassler

D. Barry Wellman

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about VLAN?
a) VLAN is used to divide a physical network into multiple logical networks.
b) VLAN is used to break large broadcast domains into smaller broadcast domains.
c) VLAN stands for Virtual Local Area Network.
d) VLAN stands for Visual Local Area Network.
Options:

A. A and C

B. B and D

C. A, B, and C

D. A, B, and D

What is the correct answer?

4

What an HTTP message contains?
a) Message Header
b) Message Type
c) Message Body
d) Message Length
Options:

A. A, C, and D

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

What are the functions of the Certificate Management System?

A. It is used to store the certificate.

B. It is used to validate the certificate.

C. It is used to revoke certificates.

D. All of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the SSL certificate?
a) SSL certificate is a data file.
b) A web server sends a public key to the web browser using an SSL certificate.
c) SSL certificate is always issued by ISO.
d) SSL certificate is a PDF document.
Options:

A. A and B

B. B and C

C. A, B, and C

D. B, C, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the computer network?

A. A computer network is an interconnection between multiple devices to share hardware resources and information.

B. A computer network is an interconnection between multiple devices to share hardware resources only.

C. Computer network is an interconnection between multiple devices to share only information among all devices.

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about VPN?
a) VPN stands for Virtual Private Network.
b) It is a technology that is used to create a secured connection over a less secured network.
c) Using the VPN, we can extend our private network using the internet.
d) All of the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

In which year e-mail was invented?

A. 1971

B. 1972

C. 1975

D. 1977

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about UDP?
a) UDP is used for multimedia streaming.
b) It is a good protocol for flowing data in one direction.
c) This protocol is suitable for query-based applications
d) None of the above
Options:

A. B and C

B. A and B

C. A, B, and C

D. D

What is the correct answer?

4

There are the following statements that are given below, what are the advantages of RING topology in a computer network.

A. In the RING topology, if we add a new device then its impact is minimal on performance

B. In the RING topology, data can travel from alternative routes to reach the destination

C. Fault identification is easy

D. All of the above

What is the correct answer?

4

There are the following statements that are given below, which of them is correct about the DELETE method of the HTTP request?

A. DELETE method is used to dismiss the HTTP request.

B. The DELETE method is used to remove unwanted data from the HTTP request.

C. The DELETE method is used to remove all current representations of resources.

D. DELETE method is used to remove all encryption information from the HTTP request.

What is the correct answer?

4

Which of the following are key parameters for the service quality of GPRS?
a) Throughput
b) Delay
c) Reliability
d) All of the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which default port is used for Telnet?

A. 23

B. 14

C. 16

D. 22

What is the correct answer?

4

UHF stands for?

A. Ultimate High Frequency

B. Universal High Frequency

C. Union High Frequency

D. Ultra High Frequency

What is the correct answer?

4

Which of the following options are used for communication between inter-switched VLANs?
a) 1Q
b) ISL
c) 5Q
d) UTP
Options:

A. A

B. B

C. A and B

D. C and D