Home
Current Affairs January 2024

What is the correct answer?

4

Which of the following is/are network device(s)?

A. Router

B. Hub

C. Switch

D. All the above

Correct Answer :

D. All the above


Related Questions

What is the correct answer?

4

Which POP command is used to delete a message?

A. DELETE

B. DEL

C. DELE

D. REMOVE

What is the correct answer?

4

Which of the following commands are used in the FTP protocol?
a) PASS
b) MKD
c) CWD
d) PWD
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about DNS in computer networks?

A. A DNS is a server which is used to convert web address or a URL into the corresponding IP address

B. A DNS is used to send or upload a data file to the server

C. A DNS is used to download the data file from the server

D. A DNS server is used to save data files into computer memory

What is the correct answer?

4

Which of the following default port is used for TFTP?

A. 69

B. 65

C. 70

D. 71

What is the correct answer?

4

Which layer of the OSI model is responsible for connection-oriented services?

A. Session Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

Which default port is used for Microsoft RDP?

A. 1189

B. 2389

C. 2289

D. 3389

What is the correct answer?

4

Which of the following are the VLAN membership methods?
a) Asynchronous
b) Synchronous
c) Static
d) Dynamic
Options:

A. A and B

B. C and D

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below, what are the advantages of MESH topology in a computer network.
a) It is the most robust network.
b) It is the most secure network.
c) Easy to configure.
d) All the above.
Options:

A. D

B. A and B

C. C

D. A, B, and C

What is the correct answer?

4

Which of the following are key parameters for the service quality of GPRS?
a) Throughput
b) Delay
c) Reliability
d) All of the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

OSI stands for?

A. Open System International

B. Open System Interconnection

C. Open Server Interconnection

D. Open Server International

What is the correct answer?

4

There are the following options that are given below, which of them are correct directives of HTTP Cache request?
a) no-cache
b) max-state
c) min-fresh
d) only-if-cached
Options:

A. A and B

B. A, B, C, and D

C. C and D

D. A, B, and C

What is the correct answer?

4

In which VTP mode, we can change VLAN information on the switch?

A. Server

B. Client

C. ISL

D. STP

What is the correct answer?

4

ISP stands for?

A. International Server Provider

B. International Service Provider

C. Internet Service Provider

D. Intranet Service Provider

What is the correct answer?

4

Which layer of the OSI model is responsible for routing?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

What is the default IP address of the localhost?

A. 127.0.0.1

B. 192.168.10.1

C. 255.255.255.255

D. 255.255.255.0

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about SSL?
a) SSL protocol is used for securing communication by sending and receiving data in the encrypted format.
b) SSL stands for Secure Socket Layer
c) SSL uses certificates to implement a secure mechanism.
d) SSL also used to save data into memory in a secure manner.
Options:

A. A and B

B. A, B, and C

C. B and C

D. A, B, C, and D

What is the correct answer?

4

There are following statements that are given below, which of them are correct about VLAN in computer networks?

A. VLAN is a virtual LAN, it is used to share only files within created LAN

B. VLAN is a virtual LAN which is used to divide a single broadcast domain into multiple broadcast domains

C. VLAN is a virtual LAN, it is used to share only hardware resources within created LAN

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which is correct about file:// scheme?

A. It is used to indicate that the file is on the local hard disk.

B. It is used to indicate that the file is on the shared folder of the local LAN.

C. Both of the above

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct advantages of VLAN?
a) Using VLAN, we can manage devices easily in the network.
b) We can create logical groups of devices on the basis of functions performed by them.
c) Using VLAN, we can reduce the size of broadcast domains.
d) VLAN allows us to add an additional layer of security.
Options:

A. A and C

B. B and D

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

Which google service is used for URL shortening?

A. goo.gl

B. goole.gl

C. go.gl

D. go.short

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about HTTP Caching?

A. HTTP caching is used to avoid sending HTTP requests many times for better performance.

B. HTTP caching is used to avoid sending HTTP full response many times for better performance.

C. Both of the above

D. None of the above

What is the correct answer?

4

Which of the following operating systems supports NFS?
a) Unix
b) Windows
c) Mac OS
d) Solaris
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about TLS?
a) TLS stands for Transport Layer Security.
b) TLS is a security protocol that is used to implement secured communication between a web browser and a web server.
c) TLS is also used to implement secured communication for emails, messaging, etc.
d) SSL is the advanced version of TLS.
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

What is the full form of ETSI?

A. European Telegraph Standard Institute

B. European Telecommunications Standard Institute

C. Eastern Telephonic Standard Institute

D. European Telephonic Standard Institute

What is the correct answer?

4

Which of the following protocols are used with HTTPS for security mechanism?

A. SSL

B. TLS

C. Both

D. None

What is the correct answer?

4

MTP stands for?

A. Message Type Protocol

B. Message Transfer Protocol

C. Media Transfer Protocol

D. Media Transmission Protocol

What is the correct answer?

4

Who was invented email?

A. Ray Tomlinson

B. Robert E. Kahn

C. Shiva Ayyaduria

D. Vint Cerf

What is the correct answer?

4

Which of the following are the components of the FTP Client?
a) Control process
b) Data transfer process
c) User Interface
d) None of the above
Options:

A. A and B

B. A and C

C. A, B, and C

D. D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about VPN?
a) VPN stands for Virtual Private Network.
b) It is a technology that is used to create a secured connection over a less secured network.
c) Using the VPN, we can extend our private network using the internet.
d) All of the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which protocol is used to provide functionalities of ARP for IPv6 addresses?

A. RARP

B. IARP

C. Neighbor Discovery Protocol

D. None of the Above