Related Questions
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about URL?
a) URL stands for Universal Resource Locator.
b) URL is a global address to access resources over the Web.
c) The resources accessed by the URL can be an HTML file, CSS file, etc
d) URL cannot use any protocol to access web resources.
Options:
What is the correct answer?
4
Which POP command is used to delete a message?
What is the correct answer?
4
There are following statements that are given below, which of them are correct about emails?
a) E-mail stands for Electronic Mail.
b) E-mail is used for sending and receiving text, images, and video files.
c) E-mail is also used for identity in the internet world.
d) E-mails are not secured enough for data transmission.
Options:
What is the correct answer?
4
Which of the following protocol is not used for a VPN?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct advantages of VLAN?
a) Using VLAN, we can manage devices easily in the network.
b) We can create logical groups of devices on the basis of functions performed by them.
c) Using VLAN, we can reduce the size of broadcast domains.
d) VLAN allows us to add an additional layer of security.
Options:
What is the correct answer?
4
How many bytes are reserved for target hardware address in ARP message format?
What is the correct answer?
4
Which default port is used for SSL based LDAP?
What is the correct answer?
4
There are the following RFC numbers that are given below, which of them are related to TLS?
a) RFC 6066
b) RFC 6961
c) RFC 7961
d) RFC 8446
Options:
What is the correct answer?
4
IMAP stands for?
A. Invoice Mail Access Protocol
B. Internet Mail Access Protocol
C. Internal Mail Access Protocol
D. International Mail Access Protocol
What is the correct answer?
4
Which of the following interface is used between the SGSN and GGSN?
What is the correct answer?
4
IMAP stands for?
A. International Message Access Protocol
B. Internet Message Access Protocol
C. Invert Message Access Protocol
D. Internet Media Access Protocol
What is the correct answer?
4
How many bytes are used for the UDP header?
What is the correct answer?
4
What is the full form of CBC?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about network topologies in computer networks?
A. The network topologies describe, how nodes or hosts are corrected in a network
B. The physical and logical layouts are used to implement network topologies
What is the correct answer?
4
What is a socket in computer networks?
A. A socket is network topology to manage a network of devices
B. A socket is the combination of IP address and port
C. A socket is a network line configuration
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about the SSL certificate?
a) SSL certificate is a data file.
b) A web server sends a public key to the web browser using an SSL certificate.
c) SSL certificate is always issued by ISO.
d) SSL certificate is a PDF document.
Options:
What is the correct answer?
4
Which default port is used for SSL based IMAP?
What is the correct answer?
4
Which of the following are the components of the FTP Client?
a) Control process
b) Data transfer process
c) User Interface
d) None of the above
Options:
What is the correct answer?
4
UDP operates on which layer of the OSI model?
What is the correct answer?
4
What are the correct components of WWW?
a) URL
b) HTTP
c) DNS
d) Web Server
Options:
What is the correct answer?
4
IPCONFIG stands for?
A. Internet Protocol Configuration
B. International Protocol Configuration
C. Internet Packet Configuration
D. Internet Process Configuration
What is the correct answer?
4
In which layer of OSI, Network Interface Card is used?
What is the correct answer?
4
TCP stands for?
A. Transport Control Protocol
B. Transfer Control Protocol
C. Transmission Control Protocol
D. Transfer Congestion Protocol
What is the correct answer?
4
There are the following statements that are given below, what are the advantages of BUS topology in a computer network.
a) We required less cabling in bus topology.
b) Easy to install
c) The communication in bus topology is faster than ring topology.
d) All the above
Options:
What is the correct answer?
4
In which network topology, all hosts are connected to the central device?
What is the correct answer?
4
Which protocol is used between the SGSN and GGSN?
What is the correct answer?
4
UHF stands for?
A. Ultimate High Frequency
B. Universal High Frequency
What is the correct answer?
4
Which of the following are not valid email client software?
a) Microsoft Outlook
b) Thunderbird
c) eM Client
d) Mailbird
Options:
D. All are valid email client software
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about HTTP Caching?
A. HTTP caching is used to avoid sending HTTP requests many times for better performance.
B. HTTP caching is used to avoid sending HTTP full response many times for better performance.
What is the correct answer?
4
Which default port is used for Tomcat Shutdown?