Related Questions
What is the correct answer?
4
What is the full form of TKIP?
A. Temporal Key Integrity Protocol
B. Temporary Key Integration Protocol
C. Template Key Internal Protocol
D. Temporary Key Internal Protocol
What is the correct answer?
4
HTTP stands for?
A. Hyper Ticks Transfer Protocol
B. Huge Time Transfer Protocol
C. Hyper Time Try Protocol
D. Hyper Text Transfer Protocol
What is the correct answer?
4
Which of the following number is assigned for IPv4 in the protocol type field of ARP message format?
What is the correct answer?
4
Which default port is used for MySql Server?
What is the correct answer?
4
TFTP uses?
What is the correct answer?
4
Which of the following are the processes of the GPRS network?
a) Attach Process
b) Detach Process
c) Authentication process
d) PDP activation process
Options:
What is the correct answer?
4
Which of the following types of connections are used in FTP?
a) Control connection
b) Data connection
c) Database connection
d) All the above
Options:
What is the correct answer?
4
Which of the following protocol(s) is/are used by IEEE 802.11 standards?
What is the correct answer?
4
A SSL certificate is also known as?
D. Cryptology Certificate
What is the correct answer?
4
How many bytes are used for the UDP header?
What is the correct answer?
4
What are the correct components of WWW?
a) URL
b) HTTP
c) DNS
d) Web Server
Options:
What is the correct answer?
4
On which layer switch and bridge are operated?
What is the correct answer?
4
There are the following statements that are given below, what are the advantages of MESH topology in a computer network.
a) It is the most robust network.
b) It is the most secure network.
c) Easy to configure.
d) All the above.
Options:
What is the correct answer?
4
SMTP stands for?
A. Server Management Transfer Protocol
B. Server Mail Transfer Protocol
C. Secure Mail Transfer Protocol
D. Simple Mail Transfer Protocol
What is the correct answer?
4
What is the full form of MTA used in SMTP?
C. Mail Transmission Agent
What is the correct answer?
4
Which part of the URL describes the protocol used in a URL?
What is the correct answer?
4
Which of the following are the parts of VPN logs?
a) User activities
b) Devices used
c) IP addresses
d) Connection and disconnection timestamps
Options:
What is the correct answer?
4
There are the following options that are given below, which of them are correct types of computer networks?
What is the correct answer?
4
Which default port is used for FTP?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about WebNFS?
a) The WebNFS is the extension of the NFS to access the file system over the internet.
b) This allows easy integration of NFS with a web browser.
c) This allows operations through the firewall.
d) All the above
Options:
What is the correct answer?
4
There are the following commands that are given below, which command is not used in the FTP protocol?
What is the correct answer?
4
IMAP stands for?
A. International Message Access Protocol
B. Internet Message Access Protocol
C. Invert Message Access Protocol
D. Internet Media Access Protocol
What is the correct answer?
4
SCTP stands for?
A. Stream Control Transmission Protocol
B. Speed Control Transfer Protocol
C. Stream Control Transfer Protocol
D. Speed Control Transmission Protocol
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about the OSI model?
A. The OSI model is a reference model that describes the network functionalities.
B. The OSI model is an implemented model that describes only network protocols.
C. The OSI model is an implemented model that describes only network topologies.
What is the correct answer?
4
What are the correct examples of media in internetworking?
What is the correct answer?
4
Which of the following are the types of HTTP header?
a) General header
b) Entity header
c) Request header
d) Response header
Options:
What is the correct answer?
4
HTCPCP stands for?
A. Hyper Text Coffee Pot Control Protocol
B. Host Text Coffee Pot Control Protocol
C. HUB Type Coffee Pot Control Protocol
D. Huge Text Coffee Pot Control Protocol
What is the correct answer?
4
In which area we can expend a WAN network?
A. We can expend a WAN network within the city
B. We can expend a WAN within an organization only
C. We can expend a WAN network within the country
D. We can expend a WAN network all over the world
What is the correct answer?
4
Which of the following are the components of the FTP Server?
a) Control process
b) Data transfer process
c) User Interface
d) None of the above
Options:
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about SSH protocol?
a) It is a remote login protocol, which is used to remotely log in using the command line.
b) SSH stands for Secure Shell.
c) Port 22 is used for SSH by default.
d) To use SSH protocol we required SSH server and SSH client programs.
Options: