Related Questions
What is the correct answer?
4
What is the full form of ETSI?
A. European Telegraph Standard Institute
B. European Telecommunications Standard Institute
C. Eastern Telephonic Standard Institute
D. European Telephonic Standard Institute
What is the correct answer?
4
Which of the following RFC number is related to FTP?
What is the correct answer?
4
Which of following VPNs supports torrenting?
a) NordVPN
b) Surfshark
c) EncVPN
d) ExpressVPN
Options:
What is the correct answer?
4
SIM stands for?
A. Simple Interface Module
B. Socket Interface Module
C. Subscriber Identity Module
D. Server Identity Module
What is the correct answer?
4
There are the following statements that are given below, which of them are the disadvantages of FTP protocol?
a) All FTP providers do not provide encrypted transfer of files.
b) It does not allow simultaneous transfers with multiple receivers.
c) We cannot send a very large file due to the size limit.
d) FTP is not supported in Linux operating system.
Options:
What is the correct answer?
4
What Certificate Authorities do?
A. Certificate Authorities authenticate the identity of computers.
B. Certificate Authorities authenticate the identity of Individuals.
What is the correct answer?
4
Which of the following are correct IEEE 802.11 network PHY standards?
a) 11a
b) 11b
c) 11p
d) 11y
Options:
What is the correct answer?
4
Which default port is used for LDAP?
What is the correct answer?
4
Who was invented HTTPS?
C. Netscape Communications
What is the correct answer?
4
Which of the following are functions of the application layer?
What is the correct answer?
4
Which of the following are correct types of network topologies in computer networks?
What is the correct answer?
4
What are the correct components of WWW?
a) URL
b) HTTP
c) DNS
d) Web Server
Options:
What is the correct answer?
4
Which of the following statements are the correct advantages of a VPN?
a) The destination cannot find your private network as a traffic origin.
b) Communication using VPN is done in an encrypted manner.
c) This is used to hide your identity to protect from hackers.
d) VPN implementation does not require any kind of server.
Options:
What is the correct answer?
4
In which area we can expend a LAN network?
A. We can expend a LAN network within the city
B. We can expend a LAN within an organization only
C. We can expend a LAN network within the country
D. We can expend a LAN network all over the world
What is the correct answer?
4
There are the following statements that are given below, what are the advantages of MESH topology in a computer network.
a) It is the most robust network.
b) It is the most secure network.
c) Easy to configure.
d) All the above.
Options:
What is the correct answer?
4
IMAP stands for?
A. Invoice Mail Access Protocol
B. Internet Mail Access Protocol
C. Internal Mail Access Protocol
D. International Mail Access Protocol
What is the correct answer?
4
Which of the following is used as a default SSH client in Windows 10?
What is the correct answer?
4
Which of the following are examples of terminal equipment GPRS class C?
A. Embedded modules used in vending machines
What is the correct answer?
4
GPRS stands for?
A. Global Processing Reserved Services
B. General Packet Radio System
C. Global Packet Radio System
D. Global Packet Radio Services
What is the correct answer?
4
There are the following statements that are given below, which of them are correct ARP?
a) The ARP protocol is used to get destination MAC address from the destination IP address.
b) The ARP protocol is used to get the destination IP address from the destination MAC address.
c) The ARP stands for Address Resolution Protocol.
d) The ARP protocol works on the same network as well as connected networks.
Options:
What is the correct answer?
4
There are following options that are given below, where can we use full-duplex?
a) Switch to Switch
b) Host to Host
c) Hub to Hub
d) Switch to host
Options:
What is the correct answer?
4
Who was developed SSTP protocol?
What is the correct answer?
4
Which POP command is used to delete a message?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about URL?
a) URL stands for Universal Resource Locator.
b) URL is a global address to access resources over the Web.
c) The resources accessed by the URL can be an HTML file, CSS file, etc
d) URL cannot use any protocol to access web resources.
Options:
What is the correct answer?
4
Which layer of the OSI model is responsible for transmission mode?
What is the correct answer?
4
HSDPA stands for?
A. Host Speed Downlink Packet Access
B. High Speed Downlink Packet Access
C. Host Speed Downloaded Packet Access
D. Host Speech Downlink Packet Access
What is the correct answer?
4
Which of the following types of data structures allowed in FTP?
a) File structure
b) Record structure
c) Page structure
d) All the above
Options:
What is the correct answer?
4
Which default port is used for IMAP?
What is the correct answer?
4
There are the following options that are given below, which of them are correct about URL encoding in HTTP?
A. URL encoding is used to replace some unsafe characters with specific characters in the URL.
B. URL encoding is used to encrypt data send in URL
C. URL encoding is used to encrypt complete URL
What is the correct answer?
4
Which of following VPNs works on the Android operating system?
a) NordVPN
b) AndrVPN
c) Surfshark
d) ExpressVPN
Options: