Home
Current Affairs January 2024

What is the correct answer?

4

Which of the following are correct types of network topologies in computer networks?

A. Bus

B. Tree

C. Mesh

D. All of the above

Correct Answer :

D. All of the above


Related Questions

What is the correct answer?

4

What is the full form of WSM?

A. WiFi Scheduled Multimedia

B. Wireless Scheduled Multimedia

C. Wireless Scheduled Media

D. WiFi Service Media

What is the correct answer?

4

Which of the following protocol(s) is/are used by IEEE 802.11 standards?

A. CSMA/CA

B. CSMA/CD

C. Both

D. None

What is the correct answer?

4

There are the following options that are given below, which of them are correct directives of HTTP Cache request?
a) no-cache
b) max-state
c) min-fresh
d) only-if-cached
Options:

A. A and B

B. A, B, C, and D

C. C and D

D. A, B, and C

What is the correct answer?

4

What are the core components of the email system?
a) Email client
b) Email server
c) Internet service provider
d) All the above
Options:

A. A and B

B. B and D

C. A and C

D. D

What is the correct answer?

4

A host address in a URL can be?

A. An IP address

B. A Domain Name

C. Both

D. None

What is the correct answer?

4

What is the full form of PKI related to SSL?

A. Public Key Infrastructure

B. Private Key Infrastructure

C. Public Key Instructions

D. Private Key Instructions

What is the correct answer?

4

Which utility command is used for FTP in the Linux operating system?

A. FTP

B. ftp

C. linuxftp

D. LinuxFtp

What is the correct answer?

4

Which of the following are correct commands used in IMAP protocol?
a) CREATE
b) DELETE
c) RENAME
d) NOOP
Options:

A. A and B

B. A and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are following statements that are given below, which of them are correct about IMAP?
a) The IMAP is used to manipulate email messaging without downloading it on a local machine.
b) It is used to access multiple mailboxes concurrently.
c) IMAP enables users to search for emails.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

The NPL network is operated by?

A. Next Physical Laboratory

B. National Physical Laboratory

C. Nexon Physical Laboratory

D. Nexon Physical Library

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the advantages of HTTPS?
a) Data Integrity
b) Encryption based security
c) Search Engine Optimization
d) Antivirus protection
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about radio signals in WiFi communication?

A. Radio signals are transmitted by WiFi Antenna and received by WiFi receivers within the range of WiFI.

B. WiFi cards are used to read the WiFi signal and create connectivity between user and network.

C. Both of the above

D. None of the above

What is the correct answer?

4

What are the responsibilities of SGSN?
a) Registration of mobiles in the network.
b) SGSN is used for authenticating GPRS mobiles
c) It is used to store routing information of GPRS mobile
d) All of the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which layer of the OSI model is responsible for bit synchronization?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

Which of the following are not functions of the data link layer?

A. Error Control

B. Routing

C. Flow Control

D. Access Control

What is the correct answer?

4

HTTP works on which layer of the OSI model?

A. Network layer

B. Transport layer

C. Presentation layer

D. Application layer

What is the correct answer?

4

In which year SSH was developed?

A. 1990

B. 1992

C. 1995

D. 1998

What is the correct answer?

4

Which of the following commands are used in the FTP protocol?
a) PASS
b) MKD
c) CWD
d) PWD
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about HTTP Messages?

A. HTTP messages are used to data CSS data from HTTP Server to the HTTP client.

B. HTTP messages are used to describe how data transferred between an HTTP client and an HTTP server.

C. Both of the above

D. None of the above

What is the correct answer?

4

TCP stands for?

A. Transport Control Protocol

B. Transfer Control Protocol

C. Transmission Control Protocol

D. Transfer Congestion Protocol

What is the correct answer?

4

Which FTP response code is used for Not logged in?

A. 520

B. 530

C. 540

D. 550

What is the correct answer?

4

Which default port is used for SSL based LDAP?

A. 636

B. 536

C. 436

D. 389

What is the correct answer?

4

Which of the following are the types of HTTP messages?
a) HTTP header message
b) HTTP request message
c) HTTP response message
d) HTTP footer message
Options:

A. A and D

B. B and C

C. Only B

D. A, B, C, and D

What is the correct answer?

4

Which of the following are components of the GPRS support node?
a) Gateway GPRS support node
b) Subnet GPRS support node
c) Serving GPRS support node
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

On which layer routers are operated?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the WiFi hotspot?
a) A WiFi hotspot is an area where devices like computers, mobile can access internet connection.
b) A WiFi hotspot can be created by installing a WiFi Access Point.
c) A WiFi access point can transmit signals in a limited area, know as the WiFi hotspot area.
d) All of the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

HSDPA stands for?

A. Host Speed Downlink Packet Access

B. High Speed Downlink Packet Access

C. Host Speed Downloaded Packet Access

D. Host Speech Downlink Packet Access

What is the correct answer?

4

Which of the following RFC number is related to URL?

A. RFC 1735

B. RFC 1738

C. RFC 2020

D. RFC 2021

What is the correct answer?

4

Which layer of the OSI model is responsible for segmentation and reassembly?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

Which of the following protocols are used for remote login?
a) telnet
b) ssh
c) ftp
d) scp
Options:

A. A and B

B. A and C

C. B and C

D. D