Home
Current Affairs January 2024

What is the correct answer?

4

Which of the following are application layer protocols?

A. FTP

B. HTTP

C. SNMP

D. All of the above

Correct Answer :

D. All of the above


Related Questions

What is the correct answer?

4

Which of the following remote login protocols are supported by the PuTTY application?
a) SSH
b) telnet
c) Rlogin
d) VNC
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following are not valid email client software?
a) Microsoft Outlook
b) Thunderbird
c) eM Client
d) Mailbird
Options:

A. B

B. B and C

C. D

D. All are valid email client software

What is the correct answer?

4

Which of the following applications are used for remote login in the Linux operating system?
a) RealVNC
b) Remmina
c) NoMachine
d) TeamViewer
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

In which area we can expend a WAN network?

A. We can expend a WAN network within the city

B. We can expend a WAN within an organization only

C. We can expend a WAN network within the country

D. We can expend a WAN network all over the world

What is the correct answer?

4

Which layer of the OSI model is responsible for transmission mode?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

There are the following options that are given below, which of them are correct parameters of the UDP header?
a) Source Port number
b) Destination Port Number
c) Checksum
d) Flow control Flags
Options:

A. A and B

B. A, B, and C

C. A, C, and D

D. A, B, C, and D

What is the correct answer?

4

WBMP stands for?

A. Wireless Bitmap image

B. Wired Bitmap image

C. Worst Bitmap image

D. Worlds Bitmap image

What is the correct answer?

4

Which of the following daemons are used at the NFS server in the Linux operating system?
a) nfsd
b) rpcbind
c) mountd
d) kmpd
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about remote login?
a) Remote login is a mechanism that is used to access the computer which is located in a different location using remote login protocols.
b) Using remote login we can access the computer through the command line only.
c) Now a day's remote login is very popular for remote support in almost all companies.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about UDP?
a) UDP is used for multimedia streaming.
b) It is a good protocol for flowing data in one direction.
c) This protocol is suitable for query-based applications
d) None of the above
Options:

A. B and C

B. A and B

C. A, B, and C

D. D

What is the correct answer?

4

Why Entity Tags are used in HTTP?
a) It is used to tag each item in the request created by the client.
b) It is used to compare two or more entities from the same requested resource.
c) It is used to download HTML documents.
d) It is used to download CSS documents.
Options:

A. Only A

B. Only B

C. A and B

D. C and D

What is the correct answer?

4

VHF stands for?

A. Very High Frequency

B. Visual High Frequency

C. Virtual High Frequency

D. Virtual Host Frequency

What is the correct answer?

4

Which of the following are the parts of the HTTP response?
a) Status
b) Message Body
c) The encryption key used for HTTP protocol security
d) Header fields for a response
Options:

A. A and B

B. B and D

C. B, C, and D

D. A, B, and D

What is the correct answer?

4

CDMA stands for?

A. Customer Division Multiple Access

B. Cost Division Multiple Access

C. Cost Derived Multiple Access

D. Code Division Multiple Access

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about WiFi?
a) WiFi is used to create a wireless network that provides broadband coverage in the local area.
b) WiFi stands for Wireless Fiction.
c) It is based on the IEEE 802.11 standard.
d) We can create a wireless network in the limit area using WiFi.
Options:

A. A and B

B. A and C

C. A, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which layer of the OSI model is responsible for routing?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

Which of the following is not part of the format of the SSL certificate?

A. Signature algorithm

B. Public Key

C. Encrypted Text

D. Name of Issuer

What is the correct answer?

4

Which of the following network devices are operated at the physical layer of the OSI model?

A. Hub

B. Repeater

C. Modems

D. All the above

What is the correct answer?

4

What is the full form of TNFS?

A. Trivial Network File System

B. Triple Network File System

C. Trusted Network File System

D. Temporary Network File System

What is the correct answer?

4

Who was invented email?

A. Ray Tomlinson

B. Robert E. Kahn

C. Shiva Ayyaduria

D. Vint Cerf

What is the correct answer?

4

Which of the following commands are used in the FTP protocol?
a) PASS
b) MKD
c) CWD
d) PWD
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Who was developed HTTP?

A. Jimmy Wales

B. Tim Berners-Lee

C. Larry Page

D. Alan Turing

What is the correct answer?

4

The telnet protocol operates on which layer of the OSI model?

A. Network layer

B. Transport layer

C. Presentation layer

D. Application layer

What is the correct answer?

4

Which of the following parameters are used for GPRS billing?
a) Amount of data transferred
b) Free of charge
c) Flat monthly rate
d) Quality of service
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are following network devices that are given below, which device that operated on layer1 is used to enlarge the area of a LAN segment?

A. NIC

B. RJ45

C. Switch

D. HUB

What is the correct answer?

4

In which network topology, all hosts are connected to the central device?

A. Star

B. Ring

C. Hybrid

D. Mesh

What is the correct answer?

4

SNMP stands for?

A. Simple Network Message Protocol

B. Secure Network Message Protocol

C. Simple Network Management Protocol

D. Secure Network Management Protocol

What is the correct answer?

4

Which layer of the OSI model is responsible for encryption and decryption?

A. Session Layer

B. Network Layer

C. Presentation Layer

D. Transport Layer

What is the correct answer?

4

VPN stands for?

A. Virtual Private Network

B. Visual Private Network

C. Visual Processing Network

D. Virtual Processing Network

What is the correct answer?

4

In which area we can expend a LAN network?

A. We can expend a LAN network within the city

B. We can expend a LAN within an organization only

C. We can expend a LAN network within the country

D. We can expend a LAN network all over the world