Home
Current Affairs January 2024

What is the correct answer?

4

Which of the following remote login protocols are supported by the PuTTY application?
a) SSH
b) telnet
c) Rlogin
d) VNC
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

Correct Answer :

B. A, B, and C


Related Questions

What is the correct answer?

4

In which network topology all hosts are connected to each other in a network?

A. Star

B. Ring

C. Hybrid

D. Mesh

What is the correct answer?

4

GSM stands for?

A. Global System for Mobile communication

B. Guest System for Mobile communication

C. Great System for Mobile communication

D. Global Server for Mobile communication

What is the correct answer?

4

There are the following statements that are given below, which is the correct about internetworking?

A. Internetworking is the mechanism to connect multiple devices in a single network to share information only.

B. Internetworking is the mechanism to connect multiple devices in a single network to share resources only.

C. Internetworking is the mechanism to connect multiple networks to share data and resources.

D. None of the above

What is the correct answer?

4

Which of the following are not correct types of network topologies in computer networks?

A. Star

B. Ring

C. Hybrid

D. None of the above

What is the correct answer?

4

Which default port is used for MS SQL Server?

A. 3506

B. 4406

C. 1306

D. 1433

What is the correct answer?

4

Which of the following statements are the correct advantages of a VPN?
a) The destination cannot find your private network as a traffic origin.
b) Communication using VPN is done in an encrypted manner.
c) This is used to hide your identity to protect from hackers.
d) VPN implementation does not require any kind of server.
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Telnet stands for?

A. Teletype Network

B. Telephone Network

C. Telegram Network

D. Telegraph Network

What is the correct answer?

4

Which of the following interface is used between the SGSN and GGSN?

A. Gn interface

B. Um interface

C. Gb interface

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are the disadvantages of FTP protocol?
a) All FTP providers do not provide encrypted transfer of files.
b) It does not allow simultaneous transfers with multiple receivers.
c) We cannot send a very large file due to the size limit.
d) FTP is not supported in Linux operating system.
Options:

A. A and B

B. B and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

NetBIOS stands for?

A. Network Basic Input Output Server

B. Network Basic Input Output System

C. Network Basic Input Output Service

D. Next Basic Input Output Server

What is the correct answer?

4

There are the following statements that are given below, which of them are correct statements about GPRS?
a) GPRS provides consistent IP services.
b) It provides wireless internet accesses over mobile phones.
c) GPRS uses the same infrastructure for different air interfaces.
d) GPRS is older technology; it does not use in the current scenario.
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below, what are the advantages of RING topology in a computer network.

A. In the RING topology, if we add a new device then its impact is minimal on performance

B. In the RING topology, data can travel from alternative routes to reach the destination

C. Fault identification is easy

D. All of the above

What is the correct answer?

4

In which year WWW was invented?

A. 1988

B. 1989

C. 1990

D. 1991

What is the correct answer?

4

How many ports can be used in network devices?

A. 1024

B. 32767

C. 65535

D. 65536

What is the correct answer?

4

Which layer of the OSI model is responsible for end to end message delivery?

A. Session Layer

B. Network Layer

C. Presentation Layer

D. Transport Layer

What is the correct answer?

4

There are following statements that are given below, which of them are correct about email addresses?
a) E-mail addresses are case sensitive.
b) E-mail address contains the domain name and user name.
c) In the e-mail address, the user name and domain name are separated by the dollar symbol.
d) E-mail addresses cannot be duplicated.
Options:

A. A and B

B. B and D

C. A, B, and C

D. A, B, and D

What is the correct answer?

4

Which of the following are not valid email client software?
a) Microsoft Outlook
b) Thunderbird
c) eM Client
d) Mailbird
Options:

A. B

B. B and C

C. D

D. All are valid email client software

What is the correct answer?

4

In which year TLS was introduced?

A. 1992

B. 1995

C. 1997

D. 1999

What is the correct answer?

4

TFTP uses?

A. TCP

B. UDP

C. Both

D. None

What is the correct answer?

4

What is the correct range of specific well-known ports, like 80 for HTTP in computer networks?

A. 0 1023

B. 1024 49151

C. 49152 65535

D. All the above

What is the correct answer?

4

Which of the following are the components of the FTP Client?
a) Control process
b) Data transfer process
c) User Interface
d) None of the above
Options:

A. A and B

B. A and C

C. A, B, and C

D. D

What is the correct answer?

4

Which of the following remote login protocols are supported by the PuTTY application?
a) SSH
b) telnet
c) Rlogin
d) VNC
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

What is the full form of VTP?

A. VLAN Tagged Protocol

B. Visual Trunking Protocol

C. VLAN Trunking Protocol

D. Virtual Tagged Protocol

What is the correct answer?

4

What is the full form of CBC?

A. Cyclic Base Channing

B. Cipher Block Channing

C. Cipher Base Channing

D. Cyclic Block Channing

What is the correct answer?

4

SMTP stands for?

A. Server Management Transfer Protocol

B. Server Mail Transfer Protocol

C. Secure Mail Transfer Protocol

D. Simple Mail Transfer Protocol

What is the correct answer?

4

How many bits are used for checksum in UDP header?

A. 4 bytes

B. 8 bytes

C. 16 bytes

D. 32 bytes

What is the correct answer?

4

Which of following VPNs works on the Android operating system?
a) NordVPN
b) AndrVPN
c) Surfshark
d) ExpressVPN
Options:

A. A and B

B. A , C, and D

C. A, B, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following RFC numbers are related to telnet?
a) RFC 860
b) RFC 861
c) RFC 885
d) RFC 1073
Options:

A. A and B

B. A and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which default port is used for SSL based IMAP?

A. 553

B. 443

C. 143

D. 993

What is the correct answer?

4

Which of the following is/are network device(s)?

A. Router

B. Hub

C. Switch

D. All the above