Home
Current Affairs January 2024

What is the correct answer?

4

Which layer of the OSI model is responsible for framing?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

Correct Answer :

A. Data Link Layer


Related Questions

What is the correct answer?

4

URL stands for?

A. Universal Resource Locator

B. Universal Reserve Location

C. Ultimate Resource Locator

D. Uniform Resource Locator

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about WebNFS?
a) The WebNFS is the extension of the NFS to access the file system over the internet.
b) This allows easy integration of NFS with a web browser.
c) This allows operations through the firewall.
d) All the above
Options:

A. A and B

B. A, and C

C. A, B, and C

D. D

What is the correct answer?

4

In which VTP mode, we can change VLAN information on the switch?

A. Server

B. Client

C. ISL

D. STP

What is the correct answer?

4

Which of the following protocol(s) is/are used by IEEE 802.11 standards?

A. CSMA/CA

B. CSMA/CD

C. Both

D. None

What is the correct answer?

4

Who was developed NFS?

A. IBM

B. Sun Microsystems

C. Microsoft

D. Oracle

What is the correct answer?

4

There are the following options that are given below, which of them an IEEE standard is used in Frame tagging?

A. 802.11

B. 802.1Q

C. 802.3

D. 802.16

What is the correct answer?

4

Which of the following are the processes of the GPRS network?
a) Attach Process
b) Detach Process
c) Authentication process
d) PDP activation process
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

What is the full form of ETSI?

A. European Telegraph Standard Institute

B. European Telecommunications Standard Institute

C. Eastern Telephonic Standard Institute

D. European Telephonic Standard Institute

What is the correct answer?

4

Which of the following applications are used for remote login?
a) AnyDesk
b) TeamViewer
c) VNC connect
d) GoToMyPC
Options:

A. A and B

B. A and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following is used as a default SSH client in Windows 10?

A. sClient

B. sshClient

C. OpenSSH

D. OpenSSHClient

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about GPRS?
a) The GRPS stands for General Packet Radio Service.
b) The GPRS is a mobile data service used in mobile phones.
c) It is a packet-switched network that can be used by multiple users to transmit data using the same transmission channel.
d) GPRS is also known as GSM-IP.
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the SSL certificate?
a) SSL certificate is a data file.
b) A web server sends a public key to the web browser using an SSL certificate.
c) SSL certificate is always issued by ISO.
d) SSL certificate is a PDF document.
Options:

A. A and B

B. B and C

C. A, B, and C

D. B, C, and D

What is the correct answer?

4

UMTS stands for?

A. Universal Mobile Telecommunication System

B. Ultimate Mobile Telecommunication System

C. Unique Mobile Telecommunication System

D. Useful Mobile Telecommunication System

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about TLS?
a) TLS stands for Transport Layer Security.
b) TLS is a security protocol that is used to implement secured communication between a web browser and a web server.
c) TLS is also used to implement secured communication for emails, messaging, etc.
d) SSL is the advanced version of TLS.
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

IPCONFIG stands for?

A. Internet Protocol Configuration

B. International Protocol Configuration

C. Internet Packet Configuration

D. Internet Process Configuration

What is the correct answer?

4

Which POP command is used to open a connection?

A. OPEN

B. LOGIN

C. CONNECT

D. ESTABLISH

What is the correct answer?

4

What is a socket in computer networks?

A. A socket is network topology to manage a network of devices

B. A socket is the combination of IP address and port

C. A socket is a network line configuration

D. None of the above

What is the correct answer?

4

Which of the following options are used for file sharing in /etc/exports file in the Redhat Linux?
a) ro
b) rw
c) no_subtree_check
d) no_root_squash
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about MESH network topologies in computer networks?

A. In the MESH topology all devices in a network are connected to a central device

B. In the MESH topology all devices in a network are connected to each other

C. In the MESH topology there is no need to required physical cable

D. None of the above

What is the correct answer?

4

How many bytes are reserved for target hardware address in ARP message format?

A. 4 bytes

B. 6 bytes

C. 8 bytes

D. 16 bytes

What is the correct answer?

4

What is the command is used to get an IP address from a URL in the windows operating system?

A. netstate

B. getipaddress

C. nslookup

D. nsipaddress

What is the correct answer?

4

Which default port is used for SSL based IMAP?

A. 553

B. 443

C. 143

D. 993

What is the correct answer?

4

There are the following statements that are given below, what are the disadvantages of BUS topology in a computer network.
a) If the main cable is damaged then the complete network will not work.
b) Network disturbance occurs when we add or remove a device into a network.
c) Performance gets decreased when a new node is added to the network.
d) There is a security issue because every node in the network can access the data for other nodes.
Options:

A. A and B

B. B and C

C. C and D

D. A, B, C, and, D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about VLAN?
a) VLAN is used to divide a physical network into multiple logical networks.
b) VLAN is used to break large broadcast domains into smaller broadcast domains.
c) VLAN stands for Virtual Local Area Network.
d) VLAN stands for Visual Local Area Network.
Options:

A. A and C

B. B and D

C. A, B, and C

D. A, B, and D

What is the correct answer?

4

What the first inter-connected network is?

A. ARPANET

B. EXTRANET

C. INTRANET

D. None of the above

What is the correct answer?

4

A MAC is also known as?

A. Physical address

B. IP address

C. Hardware address

D. Both physical address and hardware address

What is the correct answer?

4

Which default port is used for SNMP?

A. 151

B. 161

C. 171

D. 181

What is the correct answer?

4

There are the following statements that are given below, which of them are correct Inverse ARP?
a) The Inverse ARP protocol is used to get the IP address from the MAC address.
b) It is the opposite of ARP.
c) The Inverse is used in only the Linux operating system.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

What characters are normally used in the query string to define key and values?
a) %
b) ?
c) &
d) @
Options:

A. A and B

B. B and C

C. C and D

D. A, B, and C

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the advantages of HTTPS?
a) Data Integrity
b) Encryption based security
c) Search Engine Optimization
d) Antivirus protection
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D