Home
Current Affairs January 2024

What is the correct answer?

4

Which of the following commands are used for NFS?
a) exportfs -v
b) exportfs -u
c) showmount -d
d) exportnfs - k
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

Correct Answer :

C. A, B, and C


Related Questions

What is the correct answer?

4

Which transmission mode is supported in the WiFi network?

A. Simplex

B. Half-duplex

C. Full duplex

D. None of the above

What is the correct answer?

4

What is the full form of BCC in email?

A. Basic Carbon Copy

B. Blind Carbon Copy

C. Black Carbon Copy

D. Blind Clone Copy

What is the correct answer?

4

Which utility command is used for FTP in the Linux operating system?

A. FTP

B. ftp

C. linuxftp

D. LinuxFtp

What is the correct answer?

4

There are the following statements that are given below, what are the advantages of MESH topology in a computer network.
a) It is the most robust network.
b) It is the most secure network.
c) Easy to configure.
d) All the above.
Options:

A. D

B. A and B

C. C

D. A, B, and C

What is the correct answer?

4

Which of the following RFC number is used for ARP?

A. RFC 826

B. RFC 829

C. RFC 834

D. RFC 835

What is the correct answer?

4

Which of the following operating system supports telnet protocol?
a) Windows
b) Linux
c) Mac
d) All of the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which of the following are not valid email client software?
a) Microsoft Outlook
b) Thunderbird
c) eM Client
d) Mailbird
Options:

A. B

B. B and C

C. D

D. All are valid email client software

What is the correct answer?

4

URL stands for?

A. Universal Resource Locator

B. Universal Reserve Location

C. Ultimate Resource Locator

D. Uniform Resource Locator

What is the correct answer?

4

In which year HTTP 1.0 was introduced officially?

A. 1991

B. 1995

C. 1996

D. 1998

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about MESH network topologies in computer networks?

A. In the MESH topology all devices in a network are connected to a central device

B. In the MESH topology all devices in a network are connected to each other

C. In the MESH topology there is no need to required physical cable

D. None of the above

What is the correct answer?

4

Who was developed HTTP?

A. Jimmy Wales

B. Tim Berners-Lee

C. Larry Page

D. Alan Turing

What is the correct answer?

4

What is the default port for HTTP?

A. 80

B. 443

C. 15001

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about HTTPS?
a) HTTPS is the extended version of HTTP.
b) HTTPS is used for secured communication between the web browser and web server.
c) HTTPS stands for HyperText Transfer Protocol Secure.
d) HTTPS also provides anti-virus security for the website.
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

Which of the following are the types of HTTP header?
a) General header
b) Entity header
c) Request header
d) Response header
Options:

A. A, B, C and D

B. C and D

C. A, B, and C

D. A and B

What is the correct answer?

4

How many bytes are reserved for target hardware address in ARP message format?

A. 4 bytes

B. 6 bytes

C. 8 bytes

D. 16 bytes

What is the correct answer?

4

Which default port is used for MySql Server?

A. 3506

B. 4406

C. 3306

D. None of the above

What is the correct answer?

4

There are following statements that are given below, which of them are correct about IMAP?
a) The IMAP is used to manipulate email messaging without downloading it on a local machine.
b) It is used to access multiple mailboxes concurrently.
c) IMAP enables users to search for emails.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which of the following security mechanism are used for the WiFi network?
a) WEP
b) WPA
c) WPA2
d) WPA3
Options:

A. A and C

B. A and B

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

Which of the following are correct commands used in IMAP protocol?
a) CREATE
b) DELETE
c) RENAME
d) NOOP
Options:

A. A and B

B. A and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

NetBIOS stands for?

A. Network Basic Input Output Server

B. Network Basic Input Output System

C. Network Basic Input Output Service

D. Next Basic Input Output Server

What is the correct answer?

4

Which of the following is/are unique identifiers for network device(s)?

A. Hostname

B. IP address

C. Mac address

D. All the above

What is the correct answer?

4

GPRS stands for?

A. Global Processing Reserved Services

B. General Packet Radio System

C. Global Packet Radio System

D. Global Packet Radio Services

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about HYBRID topology in computer networks?

A. In the HYBRID topology all devices in a network are connected to a central device

B. The HYBRID topology is the combination of any two network topologies

C. In the HYBRID topology there is no need to required physical cable

D. None of the above

What is the correct answer?

4

There are the following RFC numbers given below which is related HTTPS?

A. RFC 2815

B. RFC 2818

C. RFC 2821

D. RFC 2854

What is the correct answer?

4

There are following statements that are given below, which statement correctly defines half duplex?

A. In a half-duplex system, during communication only devices can send information at a time.

B. In half a duplex system, during communication both devices can send or receive information simultaneously.

C. In a half-duplex system, during communication one device can send information and another device can receive.

D. None of the above.

What is the correct answer?

4

There are the following methods that are given below, which of them are correct methods used in an HTTP request?
a) GET
b) POST
c) CONNECT
d) DELETE
Options:

A. A and B

B. A, B, and C

C. A, B, and D

D. A, B, C, and D

What is the correct answer?

4

There are the following options that are given below, which of them are internetworking devices?

A. Router

B. Gateway

C. Both of the above

D. None of the above

What is the correct answer?

4

What is the full form of BSS?

A. Base Station Subsystem

B. Base Service Station

C. Base System Services

D. Basic System Services

What is the correct answer?

4

How many bits are used for checksum in UDP header?

A. 4 bytes

B. 8 bytes

C. 16 bytes

D. 32 bytes

What is the correct answer?

4

UMTS stands for?

A. Universal Mobile Telecommunication System

B. Ultimate Mobile Telecommunication System

C. Unique Mobile Telecommunication System

D. Useful Mobile Telecommunication System