Related Questions
What is the correct answer?
4
SMTP stands for?
A. Server Management Transfer Protocol
B. Server Mail Transfer Protocol
C. Secure Mail Transfer Protocol
D. Simple Mail Transfer Protocol
What is the correct answer?
4
SNMP stands for?
A. Simple Network Message Protocol
B. Secure Network Message Protocol
C. Simple Network Management Protocol
D. Secure Network Management Protocol
What is the correct answer?
4
Which FTP response code is used for Bad sequence of commands?
a) DNS
b) Inverse ARP
c) BOOTP
d) DHCP
Options:
What is the correct answer?
4
Which of the following is not part of the format of the SSL certificate?
What is the correct answer?
4
There are the following options that are given below, which of them are the correct example of a simplex system?
a) Telephone
b) Walkie-Talkie
c) Radio
d) Television
Options:
What is the correct answer?
4
Which layer of the OSI model is responsible for actual physical connections among the network devices?
What is the correct answer?
4
Which default port is used for HTTPS?
What is the correct answer?
4
Which of the following error code is used for Internal Server Error in HTTP protocol?
What is the correct answer?
4
The NPL network is operated by?
A. Next Physical Laboratory
B. National Physical Laboratory
C. Nexon Physical Laboratory
D. Nexon Physical Library
What is the correct answer?
4
Which FTP response code is used for Not logged in?
What is the correct answer?
4
Which of the following types of VLAN can be implemented?
a) Tagged VLAN
b) Untagged VLAN
c) Absolute VLAN
d) Pacific VLAN
Options:
What is the correct answer?
4
Which of the following are not valid email client software?
a) Microsoft Outlook
b) Thunderbird
c) eM Client
d) Mailbird
Options:
D. All are valid email client software
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about VPN?
a) VPN stands for Virtual Private Network.
b) It is a technology that is used to create a secured connection over a less secured network.
c) Using the VPN, we can extend our private network using the internet.
d) All of the above
Options:
What is the correct answer?
4
There are the following options that are given below, which of them are correct functionalities of the router?
A. Internetwork communication
C. Selection of best route
What is the correct answer?
4
There are the following statements that are given below, which of them is correct about the DELETE method of the HTTP request?
A. DELETE method is used to dismiss the HTTP request.
B. The DELETE method is used to remove unwanted data from the HTTP request.
C. The DELETE method is used to remove all current representations of resources.
D. DELETE method is used to remove all encryption information from the HTTP request.
What is the correct answer?
4
There are the following options that are given below, which is not the type of flow control?
What is the correct answer?
4
What is the correct example of a WAN in computer networks?
What is the correct answer?
4
There are the following commands that are given below, which command is not used in the FTP protocol?
What is the correct answer?
4
What is the maximum number for a port number in computer networks?
What is the correct answer?
4
There are the following options that are given below which of them are correct layers used in WWW?
a) Cryptography
b) User Interface Applications
c) Identifiers
d) None of the above
Options:
What is the correct answer?
4
In which year FTP was developed?
What is the correct answer?
4
What are the core components of the email system?
a) Email client
b) Email server
c) Internet service provider
d) All the above
Options:
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about the OSI model?
A. The OSI model is a reference model that describes the network functionalities.
B. The OSI model is an implemented model that describes only network protocols.
C. The OSI model is an implemented model that describes only network topologies.
What is the correct answer?
4
What are the correct sub-layers of the data link layer?
What is the correct answer?
4
In which layer of OSI, Network topologies are used?
What is the correct answer?
4
NetBIOS stands for?
A. Network Basic Input Output Server
B. Network Basic Input Output System
C. Network Basic Input Output Service
D. Next Basic Input Output Server
What is the correct answer?
4
Which of the following parameters are used for GPRS billing?
a) Amount of data transferred
b) Free of charge
c) Flat monthly rate
d) Quality of service
Options:
What is the correct answer?
4
Which layer of the OSI model is responsible for compression?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about VLAN Tagging?
a) The VLAN tagging is used to handle more than one VLAN on a port.
b) VLAN tagging can be performed by putting VLAN ID into the header to identify the network.
c) VLAN tagging is also known as VLAN trunking.
d) All the above
Options:
What is the correct answer?
4
GPRS stands for?
A. Global Processing Reserved Services
B. General Packet Radio System
C. Global Packet Radio System
D. Global Packet Radio Services