Related Questions
What is the correct answer?
4
There are following statements that are given below, which of them are correct about network topology in computer networks?
A. A network topology is used to divide a single broadcast domain into multiple broadcast
B. A network topology is a way to arrange network devices to connect with each other
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about radio signals in WiFi communication?
A. Radio signals are transmitted by WiFi Antenna and received by WiFi receivers within the range of WiFI.
B. WiFi cards are used to read the WiFi signal and create connectivity between user and network.
What is the correct answer?
4
There are following network devices that are given below, which device that operated on layer1 is used to enlarge the area of a LAN segment?
What is the correct answer?
4
SSHFS stands for?
A. Secure Shell File Server
B. Secure Shell File Software
C. Secure Shell Film Server
D. Secure Shell File System
What is the correct answer?
4
Which of the following default port is used for TFTP?
What is the correct answer?
4
Which of the following are examples of terminal equipment GPRS class C?
A. Embedded modules used in vending machines
What is the correct answer?
4
Which utility command is used for FTP in the Linux operating system?
What is the correct answer?
4
What are the correct sub-layers of the data link layer?
What is the correct answer?
4
What is OWL in the context of WWW?
A. OWL is a semantic web language.
C. OWL is a web browser using in Linux Operating System
What is the correct answer?
4
Which layer of the OSI model is responsible for compression?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about NVT?
a) The NVT is used for remote login; it defines how data and commands should be sent in the network.
b) It acts as an interface and used to resolve dependencies for remote login between client and server system.
c) The NVT stands for Network Viewer Terminal.
d) All the above
Options:
What is the correct answer?
4
Which of the following options are used for file sharing in /etc/exports file in the Redhat Linux?
a) ro
b) rw
c) no_subtree_check
d) no_root_squash
Options:
What is the correct answer?
4
Which of the following are the states of MS in the GPRS system?
a) Idle state
b) Active state
c) Standby state
d) All of the above
Options:
What is the correct answer?
4
Who was developed SSTP protocol?
What is the correct answer?
4
Which of the following statements are the correct advantages of a VPN?
a) The destination cannot find your private network as a traffic origin.
b) Communication using VPN is done in an encrypted manner.
c) This is used to hide your identity to protect from hackers.
d) VPN implementation does not require any kind of server.
Options:
What is the correct answer?
4
What the first inter-connected network is?
What is the correct answer?
4
In which year e-mail was invented?
What is the correct answer?
4
Which layer of the OSI model is responsible for end to end message delivery?
What is the correct answer?
4
Which of the following are not valid email client software?
a) Microsoft Outlook
b) Thunderbird
c) eM Client
d) Mailbird
Options:
D. All are valid email client software
What is the correct answer?
4
There are the following statements that are given below, which of them are correct types of the algorithms used in TLS protocol?
a) Key exchange algorithms
b) Bulk encryption algorithms
c) Digital Signature algorithms
d) None of the above
Options:
What is the correct answer?
4
In which year, the SMTP was proposed the first time?
What is the correct answer?
4
A SSL certificate is also known as?
D. Cryptology Certificate
What is the correct answer?
4
There are the following commands that are given below, which command is not used in the FTP protocol?
What is the correct answer?
4
How many layers used in the OSI model?
What is the correct answer?
4
Which default port is used for Oracle Listener?
What is the correct answer?
4
Which of the following protocols are used for email?
a) SMTP
b) POP
c) ICMP
d) IMAP
Options:
What is the correct answer?
4
A URL can be?
What is the correct answer?
4
In which VTP mode, we can change VLAN information on the switch?
What is the correct answer?
4
Which FTP response code is used for Not logged in?
What is the correct answer?
4
There are the following options that are given below, which of them are correct functionalities of the router?
A. Internetwork communication
C. Selection of best route