Home
Current Affairs January 2024

What is the correct answer?

4

Which of the following daemons are used at the NFS server in the Linux operating system?
a) nfsd
b) rpcbind
c) mountd
d) kmpd
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

Correct Answer :

B. A, B, and C


Related Questions

What is the correct answer?

4

Telnet stands for?

A. Teletype Network

B. Telephone Network

C. Telegram Network

D. Telegraph Network

What is the correct answer?

4

If N devices are connected in a MESH network, then how many dedicated links are required to them?

A. N

B. N+1

C. N(N+1)

D. N(N-1)/2

What is the correct answer?

4

What is the full form of RDF related to WWW?

A. Resource Description Framework

B. Reliable Document Framework

C. Robust Descriptive Framework

D. Resource Document Framework

What is the correct answer?

4

Which of the following commands are used for NFS?
a) exportfs -v
b) exportfs -u
c) showmount -d
d) exportnfs - k
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

There are the following options that are given below, which is not the type of flow control?

A. Congestion avoidance

B. Windowing

C. Cut-through

D. Buffering

What is the correct answer?

4

Which of the following Certificate Authority provides a free DV SSL certificate?

A. Symantec

B. DigiCert

C. Let's Encrypt

D. GlobalSign

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about VLAN Tagging?
a) The VLAN tagging is used to handle more than one VLAN on a port.
b) VLAN tagging can be performed by putting VLAN ID into the header to identify the network.
c) VLAN tagging is also known as VLAN trunking.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which protocol is used to provide functionalities of ARP for IPv6 addresses?

A. RARP

B. IARP

C. Neighbor Discovery Protocol

D. None of the Above

What is the correct answer?

4

What is the full form of CBC?

A. Cyclic Base Channing

B. Cipher Block Channing

C. Cipher Base Channing

D. Cyclic Block Channing

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about MESH network topologies in computer networks?

A. In the MESH topology all devices in a network are connected to a central device

B. In the MESH topology all devices in a network are connected to each other

C. In the MESH topology there is no need to required physical cable

D. None of the above

What is the correct answer?

4

Which default port is used for IMAP?

A. 553

B. 443

C. 143

D. 993

What is the correct answer?

4

Which of the following protocols are used with HTTPS for security mechanism?

A. SSL

B. TLS

C. Both

D. None

What is the correct answer?

4

Which layer of the OSI model is responsible for bit synchronization?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

DCCP stands for?

A. Datagram Congestion Control Protocol

B. Data Control Congestion Protocol

C. Datagram Control Congestion Protocol

D. Dynamic Congestion Control Protocol

What is the correct answer?

4

IPCONFIG stands for?

A. Internet Protocol Configuration

B. International Protocol Configuration

C. Internet Packet Configuration

D. Internet Process Configuration

What is the correct answer?

4

How many ports are required by a node to connect with HUB in STAR topology?

A. 1

B. 2

C. 3

D. 4

What is the correct answer?

4

In which year HTTP 1.0 was introduced officially?

A. 1991

B. 1995

C. 1996

D. 1998

What is the correct answer?

4

How many bytes are used in IPv4 addresses?

A. 4

B. 8

C. 16

D. 32

What is the correct answer?

4

On which layer switch and bridge are operated?

A. Session Layer

B. Network Layer

C. Presentation Layer

D. Data Link Layer

What is the correct answer?

4

Which command is used to terminate the SMTP connection?

A. TERM

B. QUIT

C. EXIT

D. FINISH

What is the correct answer?

4

In which year TLS was introduced?

A. 1992

B. 1995

C. 1997

D. 1999

What is the correct answer?

4

Which of the following statements are the correct advantages of a VPN?
a) The destination cannot find your private network as a traffic origin.
b) Communication using VPN is done in an encrypted manner.
c) This is used to hide your identity to protect from hackers.
d) VPN implementation does not require any kind of server.
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

What is OWL in the context of WWW?

A. OWL is a semantic web language.

B. OWL is a web server.

C. OWL is a web browser using in Linux Operating System

D. None of the above

What is the correct answer?

4

Which layer of the OSI model is responsible for bit rate?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

There are the following RFC numbers are given below, which of the following is related to UDP?

A. RFC 793

B. RFC 768

C. RFC 993

D. RFC 693

What is the correct answer?

4

What is the full form of W3C?

A. World Wide Web Council

B. World Wide Web Corporation

C. World Wide Web Consortium

D. World Wide Web Collaboration

What is the correct answer?

4

HTTP works on which layer of the OSI model?

A. Network layer

B. Transport layer

C. Presentation layer

D. Application layer

What is the correct answer?

4

Which utility command is used for FTP in the Linux operating system?

A. FTP

B. ftp

C. linuxftp

D. LinuxFtp

What is the correct answer?

4

What is a socket in computer networks?

A. A socket is network topology to manage a network of devices

B. A socket is the combination of IP address and port

C. A socket is a network line configuration

D. None of the above

What is the correct answer?

4

How many layers used in the OSI model?

A. 5

B. 6

C. 7

D. 8