Home
Current Affairs January 2024

What is the correct answer?

4

Which layer of the OSI model is responsible for transmission mode?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

Correct Answer :

C. Physical Layer


Related Questions

What is the correct answer?

4

Which of the following protocol(s) is/are used by IEEE 802.11 standards?

A. CSMA/CA

B. CSMA/CD

C. Both

D. None

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about SSL handshake?
a) SSL handshake is a process between the web browser and web servers used for verification.
b) SSL handshake begins before transferring actual data.
c) SSL handshake is used to verify the SSL certificate.
d) SSL handshake is used for webserver authentication.
Options:

A. A and B

B. A and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following services are used for NFS in the Redhat Linux operating system?
a) nfs
b) portmap
c) mountd
d) None of the above
Options:

A. A and B

B. A, and C

C. A, B, and C

D. D

What is the correct answer?

4

Which utility command is used for FTP in the Linux operating system?

A. FTP

B. ftp

C. linuxftp

D. LinuxFtp

What is the correct answer?

4

Which of the following are functions of the application layer?

A. Mail Services

B. File Transfer

C. Virtual terminals

D. All of the above

What is the correct answer?

4

How many cables are required when N devices are connected with HUB in STAR topology?

A. N-1

B. N+1

C. N

D. N+2

What is the correct answer?

4

SSH stands for?

A. Secure Shell

B. Server Shell

C. Simple Shell

D. Software Shell

What is the correct answer?

4

Which of the following are correct types of network topologies in computer networks?

A. Bus

B. Tree

C. Mesh

D. All of the above

What is the correct answer?

4

Which default port is used for Redis Server?

A. 3379

B. 4379

C. 5379

D. 6379

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about network topologies in computer networks?

A. The network topologies describe, how nodes or hosts are corrected in a network

B. The physical and logical layouts are used to implement network topologies

C. Both of the above

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which is correct about file:// scheme?

A. It is used to indicate that the file is on the local hard disk.

B. It is used to indicate that the file is on the shared folder of the local LAN.

C. Both of the above

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the computer network?

A. A computer network is an interconnection between multiple devices to share hardware resources and information.

B. A computer network is an interconnection between multiple devices to share hardware resources only.

C. Computer network is an interconnection between multiple devices to share only information among all devices.

D. None of the above

What is the correct answer?

4

Which of the following Certificate Authority provides a free DV SSL certificate?

A. Symantec

B. DigiCert

C. Let's Encrypt

D. GlobalSign

What is the correct answer?

4

Which of the following protocol is used to broadcast MAC address to the entire network when a computer boots up?

A. Inverse ARP

B. Proxy ARP

C. Gratuitous ARP

D. Serial Line ARP

What is the correct answer?

4

Which default port is used for MQ Listener?

A. 1515

B. 1414

C. 1616

D. 1717

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the advantages of HTTPS?
a) Data Integrity
b) Encryption based security
c) Search Engine Optimization
d) Antivirus protection
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

IMAP stands for?

A. Invoice Mail Access Protocol

B. Internet Mail Access Protocol

C. Internal Mail Access Protocol

D. International Mail Access Protocol

What is the correct answer?

4

Which of the following NFS command is used to lists the available shares at the remote server?

A. showmount e

B. showmount d

C. exportfs u

D. exportfs v

What is the correct answer?

4

What is the full form of SSTP protocol?

A. Secure Socket Tunneling Protocol

B. Secure Service Tunneling Protocol

C. Secure Server Tunneling Protocol

D. Secure Saver Tunneling Protocol

What is the correct answer?

4

Which of the following are the processes of the GPRS network?
a) Attach Process
b) Detach Process
c) Authentication process
d) PDP activation process
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

What Certificate Authorities do?

A. Certificate Authorities authenticate the identity of computers.

B. Certificate Authorities authenticate the identity of Individuals.

C. Both

D. None

What is the correct answer?

4

UDP operates on which layer of the OSI model?

A. Network layer

B. Transport layer

C. Presentation layer

D. Application layer

What is the correct answer?

4

What is the full form of TFTP?

A. Transport File Transfer Protocol

B. Tree File Transfer Protocol

C. Trivial File Transfer Protocol

D. Trim File Transfer Protocol

What is the correct answer?

4

In which year, the SMTP was proposed the first time?

A. 1980

B. 1982

C. 1983

D. 1988

What is the correct answer?

4

Which technique is used to provide a small name for the complete URL?

A. URL cutting

B. URL minimizing

C. URL shortening

D. URL smalling

What is the correct answer?

4

What is used for '$' for URL encoding?

A. %24

B. %25

C. %26

D. %27

What is the correct answer?

4

Which of the following address is used in Ethernet broadcast for ARP request?

A. 255.255.255.255

B. 255.255.255.254

C. FF:FF:FF:FF:FF:FF

D. 255.255.255.251

What is the correct answer?

4

There are the following RFC numbers given below which is related HTTPS?

A. RFC 2815

B. RFC 2818

C. RFC 2821

D. RFC 2854

What is the correct answer?

4

In which network topology, all hosts are connected to the central device?

A. Star

B. Ring

C. Hybrid

D. Mesh

What is the correct answer?

4

In which year TLS was introduced?

A. 1992

B. 1995

C. 1997

D. 1999