Home
Current Affairs January 2024

What is the correct answer?

4

Which layer of the OSI model is responsible for compression?

A. Session Layer

B. Network Layer

C. Presentation Layer

D. Transport Layer

Correct Answer :

C. Presentation Layer


Related Questions

What is the correct answer?

4

Which of the following are the parts of the HTTP response?
a) Status
b) Message Body
c) The encryption key used for HTTP protocol security
d) Header fields for a response
Options:

A. A and B

B. B and D

C. B, C, and D

D. A, B, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about network topologies in computer networks?

A. The network topologies describe, how nodes or hosts are corrected in a network

B. The physical and logical layouts are used to implement network topologies

C. Both of the above

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the advantages of HTTPS?
a) Data Integrity
b) Encryption based security
c) Search Engine Optimization
d) Antivirus protection
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

Why Entity Tags are used in HTTP?
a) It is used to tag each item in the request created by the client.
b) It is used to compare two or more entities from the same requested resource.
c) It is used to download HTML documents.
d) It is used to download CSS documents.
Options:

A. Only A

B. Only B

C. A and B

D. C and D

What is the correct answer?

4

What is the full form of RDF related to WWW?

A. Resource Description Framework

B. Reliable Document Framework

C. Robust Descriptive Framework

D. Resource Document Framework

What is the correct answer?

4

There are the following statements that are given below which of them are correct about WWW?
a) WWW is the collection of web applications, documents, and other web resources that can be accessed using the internet.
b) WWW stands for World Wide Web.
c) WWW and the internet are the same.
d) WWW and the internet are different from each other.
Options:

A. A and B

B. B and C

C. A, B, and C

D. A, B, and D

What is the correct answer?

4

Which default port is used for FTP?

A. 8090

B. 25

C. 21

D. 35

What is the correct answer?

4

If N devices are connected in a MESH network, then how many dedicated links are required to them?

A. N

B. N+1

C. N(N+1)

D. N(N-1)/2

What is the correct answer?

4

Who was developed SSTP protocol?

A. Microsoft

B. IBM

C. CISCO

D. GOOGLE

What is the correct answer?

4

Who was invented VLAN?

A. W. David Sincoskie

B. Randy Bush

C. Kevin E. Bassler

D. Barry Wellman

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about STAR network topologies in computer networks?

A. In the STAR topology all devices in a network are connected to a central device

B. In the STAR topology all devices in a network are connected to each other

C. In the STAR topology there is no need to required physical cable

D. None of the above

What is the correct answer?

4

WML stands for?

A. World Markup Language

B. Wisdom Markup Language

C. Worst Markup Language

D. Wireless Markup Language

What is the correct answer?

4

Which of the following are correct commands used in the POP protocol?
a) STAT
b) LIST
c) DELETE
d) RSET
Options:

A. A and B

B. A and C

C. A, B, and D

D. D

What is the correct answer?

4

RTS stands for?

A. Real Time Streaming

B. Rest Trigger Storage

C. Rare Time Stream

D. Real Time Signal

What is the correct answer?

4

In which year SSH was developed?

A. 1990

B. 1992

C. 1995

D. 1998

What is the correct answer?

4

There are the following statements that are given below, which of them are correct OP code used in ARP message format?
a) The OP code is used to specify the type of ARP message.
b) The OP code is part of only the ARP request message.
c) The OP code 1 is used for ARP request.
d) The OP code 0 is used for ARP reply.
Options:

A. A and B

B. A and C

C. B and C

D. A, C, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about SSL handshake?
a) SSL handshake is a process between the web browser and web servers used for verification.
b) SSL handshake begins before transferring actual data.
c) SSL handshake is used to verify the SSL certificate.
d) SSL handshake is used for webserver authentication.
Options:

A. A and B

B. A and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which protocol is used to provide functionalities of ARP for IPv6 addresses?

A. RARP

B. IARP

C. Neighbor Discovery Protocol

D. None of the Above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct advantages of VLAN?
a) Using VLAN, we can manage devices easily in the network.
b) We can create logical groups of devices on the basis of functions performed by them.
c) Using VLAN, we can reduce the size of broadcast domains.
d) VLAN allows us to add an additional layer of security.
Options:

A. A and C

B. B and D

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

Which of the following are parts of the ARP message format?
a) Hardware Type
b) Sender Hardware Address
c) OP code
d) Sender Protocol Address
Options:

A. A and B

B. C and D

C. A, B, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following NFS command is used to lists the available shares at the remote server?

A. showmount e

B. showmount d

C. exportfs u

D. exportfs v

What is the correct answer?

4

What is used for '$' for URL encoding?

A. %24

B. %25

C. %26

D. %27

What is the correct answer?

4

What is the command is used to get an IP address from a URL in the windows operating system?

A. netstate

B. getipaddress

C. nslookup

D. nsipaddress

What is the correct answer?

4

There are the following statements that are given below, which of them are correct Inverse ARP?
a) The Inverse ARP protocol is used to get the IP address from the MAC address.
b) It is the opposite of ARP.
c) The Inverse is used in only the Linux operating system.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which of the following security mechanism are used for the WiFi network?
a) WEP
b) WPA
c) WPA2
d) WPA3
Options:

A. A and C

B. A and B

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

Which of the following are the parts of VPN logs?
a) User activities
b) Devices used
c) IP addresses
d) Connection and disconnection timestamps
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

What is the default IP address of the localhost?

A. 127.0.0.1

B. 192.168.10.1

C. 255.255.255.255

D. 255.255.255.0

What is the correct answer?

4

Which of the following HTTP response code is used for temporary redirection?

A. 301

B. 302

C. 303

D. 304

What is the correct answer?

4

Which of the following are application layer protocols?

A. FTP

B. HTTP

C. SNMP

D. All of the above

What is the correct answer?

4

A host address in a URL can be?

A. An IP address

B. A Domain Name

C. Both

D. None