Home
Current Affairs January 2024

What is the correct answer?

4

Which FTP response code is used for Bad sequence of commands?
a) DNS
b) Inverse ARP
c) BOOTP
d) DHCP
Options:

A. 501

B. 502

C. 503

D. 504

Correct Answer :

C. 503


Related Questions

What is the correct answer?

4

What is the full form of TKIP?

A. Temporal Key Integrity Protocol

B. Temporary Key Integration Protocol

C. Template Key Internal Protocol

D. Temporary Key Internal Protocol

What is the correct answer?

4

HTTP stands for?

A. Hyper Ticks Transfer Protocol

B. Huge Time Transfer Protocol

C. Hyper Time Try Protocol

D. Hyper Text Transfer Protocol

What is the correct answer?

4

Which of the following number is assigned for IPv4 in the protocol type field of ARP message format?

A. 0x400

B. 0x800

C. 0x100

D. 0x200

What is the correct answer?

4

Which default port is used for MySql Server?

A. 3506

B. 4406

C. 3306

D. None of the above

What is the correct answer?

4

TFTP uses?

A. TCP

B. UDP

C. Both

D. None

What is the correct answer?

4

Which of the following are the processes of the GPRS network?
a) Attach Process
b) Detach Process
c) Authentication process
d) PDP activation process
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following types of connections are used in FTP?
a) Control connection
b) Data connection
c) Database connection
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which of the following protocol(s) is/are used by IEEE 802.11 standards?

A. CSMA/CA

B. CSMA/CD

C. Both

D. None

What is the correct answer?

4

A SSL certificate is also known as?

A. Security Certificate

B. Privacy Certificate

C. Digital Certificate

D. Cryptology Certificate

What is the correct answer?

4

How many bytes are used for the UDP header?

A. 4 bytes

B. 8 bytes

C. 16 bytes

D. 32 bytes

What is the correct answer?

4

What are the correct components of WWW?
a) URL
b) HTTP
c) DNS
d) Web Server
Options:

A. C and D

B. A and B

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

On which layer switch and bridge are operated?

A. Session Layer

B. Network Layer

C. Presentation Layer

D. Data Link Layer

What is the correct answer?

4

There are the following statements that are given below, what are the advantages of MESH topology in a computer network.
a) It is the most robust network.
b) It is the most secure network.
c) Easy to configure.
d) All the above.
Options:

A. D

B. A and B

C. C

D. A, B, and C

What is the correct answer?

4

SMTP stands for?

A. Server Management Transfer Protocol

B. Server Mail Transfer Protocol

C. Secure Mail Transfer Protocol

D. Simple Mail Transfer Protocol

What is the correct answer?

4

What is the full form of MTA used in SMTP?

A. Mail Time Association

B. Mail Trim Agent

C. Mail Transmission Agent

D. Mail Transfer Agent

What is the correct answer?

4

Which part of the URL describes the protocol used in a URL?

A. Scheme

B. Host Address

C. File Path

D. None of the above

What is the correct answer?

4

Which of the following are the parts of VPN logs?
a) User activities
b) Devices used
c) IP addresses
d) Connection and disconnection timestamps
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are the following options that are given below, which of them are correct types of computer networks?

A. WAN

B. LAN

C. MAN

D. All of the above

What is the correct answer?

4

Which default port is used for FTP?

A. 8090

B. 25

C. 21

D. 35

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about WebNFS?
a) The WebNFS is the extension of the NFS to access the file system over the internet.
b) This allows easy integration of NFS with a web browser.
c) This allows operations through the firewall.
d) All the above
Options:

A. A and B

B. A, and C

C. A, B, and C

D. D

What is the correct answer?

4

There are the following commands that are given below, which command is not used in the FTP protocol?

A. KGD

B. USER

C. RETR

D. RMD

What is the correct answer?

4

IMAP stands for?

A. International Message Access Protocol

B. Internet Message Access Protocol

C. Invert Message Access Protocol

D. Internet Media Access Protocol

What is the correct answer?

4

SCTP stands for?

A. Stream Control Transmission Protocol

B. Speed Control Transfer Protocol

C. Stream Control Transfer Protocol

D. Speed Control Transmission Protocol

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the OSI model?

A. The OSI model is a reference model that describes the network functionalities.

B. The OSI model is an implemented model that describes only network protocols.

C. The OSI model is an implemented model that describes only network topologies.

D. None of the above.

What is the correct answer?

4

What are the correct examples of media in internetworking?

A. Copper cables

B. Fiber cables

C. Wireless signals

D. All of the above

What is the correct answer?

4

Which of the following are the types of HTTP header?
a) General header
b) Entity header
c) Request header
d) Response header
Options:

A. A, B, C and D

B. C and D

C. A, B, and C

D. A and B

What is the correct answer?

4

HTCPCP stands for?

A. Hyper Text Coffee Pot Control Protocol

B. Host Text Coffee Pot Control Protocol

C. HUB Type Coffee Pot Control Protocol

D. Huge Text Coffee Pot Control Protocol

What is the correct answer?

4

In which area we can expend a WAN network?

A. We can expend a WAN network within the city

B. We can expend a WAN within an organization only

C. We can expend a WAN network within the country

D. We can expend a WAN network all over the world

What is the correct answer?

4

Which of the following are the components of the FTP Server?
a) Control process
b) Data transfer process
c) User Interface
d) None of the above
Options:

A. A and B

B. A and C

C. A, B, and C

D. D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about SSH protocol?
a) It is a remote login protocol, which is used to remotely log in using the command line.
b) SSH stands for Secure Shell.
c) Port 22 is used for SSH by default.
d) To use SSH protocol we required SSH server and SSH client programs.
Options:

A. A and B

B. A and C

C. B and C

D. D