Related Questions
What is the correct answer?
4
Which of the following are the parts of the HTTP response?
a) Status
b) Message Body
c) The encryption key used for HTTP protocol security
d) Header fields for a response
Options:
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about network topologies in computer networks?
A. The network topologies describe, how nodes or hosts are corrected in a network
B. The physical and logical layouts are used to implement network topologies
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about the advantages of HTTPS?
a) Data Integrity
b) Encryption based security
c) Search Engine Optimization
d) Antivirus protection
Options:
What is the correct answer?
4
Why Entity Tags are used in HTTP?
a) It is used to tag each item in the request created by the client.
b) It is used to compare two or more entities from the same requested resource.
c) It is used to download HTML documents.
d) It is used to download CSS documents.
Options:
What is the correct answer?
4
What is the full form of RDF related to WWW?
A. Resource Description Framework
B. Reliable Document Framework
C. Robust Descriptive Framework
D. Resource Document Framework
What is the correct answer?
4
There are the following statements that are given below which of them are correct about WWW?
a) WWW is the collection of web applications, documents, and other web resources that can be accessed using the internet.
b) WWW stands for World Wide Web.
c) WWW and the internet are the same.
d) WWW and the internet are different from each other.
Options:
What is the correct answer?
4
Which default port is used for FTP?
What is the correct answer?
4
If N devices are connected in a MESH network, then how many dedicated links are required to them?
What is the correct answer?
4
Who was developed SSTP protocol?
What is the correct answer?
4
Who was invented VLAN?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about STAR network topologies in computer networks?
A. In the STAR topology all devices in a network are connected to a central device
B. In the STAR topology all devices in a network are connected to each other
C. In the STAR topology there is no need to required physical cable
What is the correct answer?
4
WML stands for?
B. Wisdom Markup Language
D. Wireless Markup Language
What is the correct answer?
4
Which of the following are correct commands used in the POP protocol?
a) STAT
b) LIST
c) DELETE
d) RSET
Options:
What is the correct answer?
4
RTS stands for?
What is the correct answer?
4
In which year SSH was developed?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct OP code used in ARP message format?
a) The OP code is used to specify the type of ARP message.
b) The OP code is part of only the ARP request message.
c) The OP code 1 is used for ARP request.
d) The OP code 0 is used for ARP reply.
Options:
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about SSL handshake?
a) SSL handshake is a process between the web browser and web servers used for verification.
b) SSL handshake begins before transferring actual data.
c) SSL handshake is used to verify the SSL certificate.
d) SSL handshake is used for webserver authentication.
Options:
What is the correct answer?
4
Which protocol is used to provide functionalities of ARP for IPv6 addresses?
C. Neighbor Discovery Protocol
What is the correct answer?
4
There are the following statements that are given below, which of them are correct advantages of VLAN?
a) Using VLAN, we can manage devices easily in the network.
b) We can create logical groups of devices on the basis of functions performed by them.
c) Using VLAN, we can reduce the size of broadcast domains.
d) VLAN allows us to add an additional layer of security.
Options:
What is the correct answer?
4
Which of the following are parts of the ARP message format?
a) Hardware Type
b) Sender Hardware Address
c) OP code
d) Sender Protocol Address
Options:
What is the correct answer?
4
Which of the following NFS command is used to lists the available shares at the remote server?
What is the correct answer?
4
What is used for '$' for URL encoding?
What is the correct answer?
4
What is the command is used to get an IP address from a URL in the windows operating system?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct Inverse ARP?
a) The Inverse ARP protocol is used to get the IP address from the MAC address.
b) It is the opposite of ARP.
c) The Inverse is used in only the Linux operating system.
d) All the above
Options:
What is the correct answer?
4
Which of the following security mechanism are used for the WiFi network?
a) WEP
b) WPA
c) WPA2
d) WPA3
Options:
What is the correct answer?
4
Which of the following are the parts of VPN logs?
a) User activities
b) Devices used
c) IP addresses
d) Connection and disconnection timestamps
Options:
What is the correct answer?
4
What is the default IP address of the localhost?
What is the correct answer?
4
Which of the following HTTP response code is used for temporary redirection?
What is the correct answer?
4
Which of the following are application layer protocols?
What is the correct answer?
4
A host address in a URL can be?