Home
Current Affairs January 2024

What is the correct answer?

4

Which default port is used for SSL based LDAP?

A. 636

B. 536

C. 436

D. 389

Correct Answer :

A. 636


Related Questions

What is the correct answer?

4

SMTP stands for?

A. Server Management Transfer Protocol

B. Server Mail Transfer Protocol

C. Secure Mail Transfer Protocol

D. Simple Mail Transfer Protocol

What is the correct answer?

4

SNMP stands for?

A. Simple Network Message Protocol

B. Secure Network Message Protocol

C. Simple Network Management Protocol

D. Secure Network Management Protocol

What is the correct answer?

4

Which FTP response code is used for Bad sequence of commands?
a) DNS
b) Inverse ARP
c) BOOTP
d) DHCP
Options:

A. 501

B. 502

C. 503

D. 504

What is the correct answer?

4

Which of the following is not part of the format of the SSL certificate?

A. Signature algorithm

B. Public Key

C. Encrypted Text

D. Name of Issuer

What is the correct answer?

4

There are the following options that are given below, which of them are the correct example of a simplex system?
a) Telephone
b) Walkie-Talkie
c) Radio
d) Television
Options:

A. Only A

B. Only B

C. A and B

D. C and D

What is the correct answer?

4

Which layer of the OSI model is responsible for actual physical connections among the network devices?

A. Data Link Layer

B. Network Layer

C. Transport Layer

D. Physical Layer

What is the correct answer?

4

Which default port is used for HTTPS?

A. 80

B. 443

C. 543

D. 643

What is the correct answer?

4

Which of the following error code is used for Internal Server Error in HTTP protocol?

A. 500

B. 501

C. 503

D. 504

What is the correct answer?

4

The NPL network is operated by?

A. Next Physical Laboratory

B. National Physical Laboratory

C. Nexon Physical Laboratory

D. Nexon Physical Library

What is the correct answer?

4

Which FTP response code is used for Not logged in?

A. 520

B. 530

C. 540

D. 550

What is the correct answer?

4

Which of the following types of VLAN can be implemented?
a) Tagged VLAN
b) Untagged VLAN
c) Absolute VLAN
d) Pacific VLAN
Options:

A. A and B

B. C and D

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

Which of the following are not valid email client software?
a) Microsoft Outlook
b) Thunderbird
c) eM Client
d) Mailbird
Options:

A. B

B. B and C

C. D

D. All are valid email client software

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about VPN?
a) VPN stands for Virtual Private Network.
b) It is a technology that is used to create a secured connection over a less secured network.
c) Using the VPN, we can extend our private network using the internet.
d) All of the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

There are the following options that are given below, which of them are correct functionalities of the router?

A. Internetwork communication

B. Packet switching

C. Selection of best route

D. All of the above

What is the correct answer?

4

There are the following statements that are given below, which of them is correct about the DELETE method of the HTTP request?

A. DELETE method is used to dismiss the HTTP request.

B. The DELETE method is used to remove unwanted data from the HTTP request.

C. The DELETE method is used to remove all current representations of resources.

D. DELETE method is used to remove all encryption information from the HTTP request.

What is the correct answer?

4

There are the following options that are given below, which is not the type of flow control?

A. Congestion avoidance

B. Windowing

C. Cut-through

D. Buffering

What is the correct answer?

4

What is the correct example of a WAN in computer networks?

A. Intranet

B. Extranet

C. Internet

D. None of the above

What is the correct answer?

4

There are the following commands that are given below, which command is not used in the FTP protocol?

A. KGD

B. USER

C. RETR

D. RMD

What is the correct answer?

4

What is the maximum number for a port number in computer networks?

A. 1024

B. 32767

C. 65535

D. 65536

What is the correct answer?

4

There are the following options that are given below which of them are correct layers used in WWW?
a) Cryptography
b) User Interface Applications
c) Identifiers
d) None of the above
Options:

A. B and C

B. A and B

C. A, B, and C

D. D

What is the correct answer?

4

In which year FTP was developed?

A. 1987

B. 1971

C. 1988

D. 2001

What is the correct answer?

4

What are the core components of the email system?
a) Email client
b) Email server
c) Internet service provider
d) All the above
Options:

A. A and B

B. B and D

C. A and C

D. D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the OSI model?

A. The OSI model is a reference model that describes the network functionalities.

B. The OSI model is an implemented model that describes only network protocols.

C. The OSI model is an implemented model that describes only network topologies.

D. None of the above.

What is the correct answer?

4

What are the correct sub-layers of the data link layer?

A. Media Access Control

B. Logical Link Layer

C. Both of the above

D. None of the above

What is the correct answer?

4

In which layer of OSI, Network topologies are used?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

NetBIOS stands for?

A. Network Basic Input Output Server

B. Network Basic Input Output System

C. Network Basic Input Output Service

D. Next Basic Input Output Server

What is the correct answer?

4

Which of the following parameters are used for GPRS billing?
a) Amount of data transferred
b) Free of charge
c) Flat monthly rate
d) Quality of service
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which layer of the OSI model is responsible for compression?

A. Session Layer

B. Network Layer

C. Presentation Layer

D. Transport Layer

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about VLAN Tagging?
a) The VLAN tagging is used to handle more than one VLAN on a port.
b) VLAN tagging can be performed by putting VLAN ID into the header to identify the network.
c) VLAN tagging is also known as VLAN trunking.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

GPRS stands for?

A. Global Processing Reserved Services

B. General Packet Radio System

C. Global Packet Radio System

D. Global Packet Radio Services