Home
Current Affairs January 2024

What is the correct answer?

4

Which of the following protocols are used for remote login?
a) telnet
b) ssh
c) ftp
d) scp
Options:

A. A and B

B. A and C

C. B and C

D. D

Correct Answer :

A. A and B


Related Questions

What is the correct answer?

4

What is the full form of ETSI?

A. European Telegraph Standard Institute

B. European Telecommunications Standard Institute

C. Eastern Telephonic Standard Institute

D. European Telephonic Standard Institute

What is the correct answer?

4

Which of the following are not valid email client software?
a) Microsoft Outlook
b) Thunderbird
c) eM Client
d) Mailbird
Options:

A. B

B. B and C

C. D

D. All are valid email client software

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about URL?
a) URL stands for Universal Resource Locator.
b) URL is a global address to access resources over the Web.
c) The resources accessed by the URL can be an HTML file, CSS file, etc
d) URL cannot use any protocol to access web resources.
Options:

A. A and B

B. B and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

Which of the following are application layer protocols?

A. FTP

B. HTTP

C. SNMP

D. All of the above

What is the correct answer?

4

Which of the following configuration file is used to control on which port RPC and other services are listening in the Redhat Linux operating system?

A. /etc/sysconfig/nfs/

B. /etc/fstab/

C. /etc/exports

D. None of the above

What is the correct answer?

4

There are the following statements that are given below which of them are correct about WWW?
a) WWW is the collection of web applications, documents, and other web resources that can be accessed using the internet.
b) WWW stands for World Wide Web.
c) WWW and the internet are the same.
d) WWW and the internet are different from each other.
Options:

A. A and B

B. B and C

C. A, B, and C

D. A, B, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about OpenVPN protocol?
a) This protocol uses SSL/TLS based communication.
b) It is an open-source project, improved by hundreds of developers.
c) It is not an open-source protocol.
d) None of the above.
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of following VPNs works on the Android operating system?
a) NordVPN
b) AndrVPN
c) Surfshark
d) ExpressVPN
Options:

A. A and B

B. A , C, and D

C. A, B, and D

D. A, B, C, and D

What is the correct answer?

4

In which year ARP was defined first time in Request for Comment?

A. 1982

B. 1985

C. 1988

D. 1990

What is the correct answer?

4

What is the full form of TNFS?

A. Trivial Network File System

B. Triple Network File System

C. Trusted Network File System

D. Temporary Network File System

What is the correct answer?

4

What is ARP spoofing?

A. ARP proxy request

B. RARP request

C. Inverse ARP request

D. Type of network attack

What is the correct answer?

4

There are following statements that are given below, which of them are correct about POP?
a) POP stands for Post Office Protocol.
b) POP is used to support a single client.
c) POP supports offline access to messages.
d) All of the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which of the following is not part of the format of the SSL certificate?

A. Signature algorithm

B. Public Key

C. Encrypted Text

D. Name of Issuer

What is the correct answer?

4

Which of the following is the correct bandwidth of the IEEE 802.11b standard?

A. 22 MHz

B. 20 MHz

C. 30 MHz

D. 25 MHz

What is the correct answer?

4

In which network topology all hosts are connected to each other in a network?

A. Star

B. Ring

C. Hybrid

D. Mesh

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about VLAN?
a) VLAN is used to divide a physical network into multiple logical networks.
b) VLAN is used to break large broadcast domains into smaller broadcast domains.
c) VLAN stands for Virtual Local Area Network.
d) VLAN stands for Visual Local Area Network.
Options:

A. A and C

B. B and D

C. A, B, and C

D. A, B, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the computer network?

A. A computer network is an interconnection between multiple devices to share hardware resources and information.

B. A computer network is an interconnection between multiple devices to share hardware resources only.

C. Computer network is an interconnection between multiple devices to share only information among all devices.

D. None of the above

What is the correct answer?

4

Which of the following configuration file is used for SSH in the Linux operating system?

A. /etc/config/ssh.conf

B. /etc/ssh/sshd_config

C. /etc/ssh.config

D. /etc/sshfs.conf

What is the correct answer?

4

What are the core components of the email system?
a) Email client
b) Email server
c) Internet service provider
d) All the above
Options:

A. A and B

B. B and D

C. A and C

D. D

What is the correct answer?

4

What are the correct components of WWW?
a) URL
b) HTTP
c) DNS
d) Web Server
Options:

A. C and D

B. A and B

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are following statements that are given below, which statement correctly defines half duplex?

A. In a half-duplex system, during communication only devices can send information at a time.

B. In half a duplex system, during communication both devices can send or receive information simultaneously.

C. In a half-duplex system, during communication one device can send information and another device can receive.

D. None of the above.

What is the correct answer?

4

Which POP command is used to open a connection?

A. OPEN

B. LOGIN

C. CONNECT

D. ESTABLISH

What is the correct answer?

4

Which of the following is used as a default SSH client in Windows 10?

A. sClient

B. sshClient

C. OpenSSH

D. OpenSSHClient

What is the correct answer?

4

Which of the following RFC numbers are related to telnet?
a) RFC 860
b) RFC 861
c) RFC 885
d) RFC 1073
Options:

A. A and B

B. A and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are the following RFC numbers that are given below, which of them are related to TLS?
a) RFC 6066
b) RFC 6961
c) RFC 7961
d) RFC 8446
Options:

A. A and B

B. A, B, and C

C. A, B, and D

D. A, B, C, and D

What is the correct answer?

4

What is a socket in computer networks?

A. A socket is network topology to manage a network of devices

B. A socket is the combination of IP address and port

C. A socket is a network line configuration

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about HTTP Messages?

A. HTTP messages are used to data CSS data from HTTP Server to the HTTP client.

B. HTTP messages are used to describe how data transferred between an HTTP client and an HTTP server.

C. Both of the above

D. None of the above

What is the correct answer?

4

CDMA stands for?

A. Customer Division Multiple Access

B. Cost Division Multiple Access

C. Cost Derived Multiple Access

D. Code Division Multiple Access

What is the correct answer?

4

There are the following statements that are given below, which of them are correct Inverse ARP?
a) The Inverse ARP protocol is used to get the IP address from the MAC address.
b) It is the opposite of ARP.
c) The Inverse is used in only the Linux operating system.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

What is the full form of W3C?

A. World Wide Web Council

B. World Wide Web Corporation

C. World Wide Web Consortium

D. World Wide Web Collaboration