Home
Current Affairs January 2024

What is the correct answer?

4

Which protocol is used to provide functionalities of ARP for IPv6 addresses?

A. RARP

B. IARP

C. Neighbor Discovery Protocol

D. None of the Above

Correct Answer :

C. Neighbor Discovery Protocol


Related Questions

What is the correct answer?

4

Which layer of the OSI model is responsible for segmentation and reassembly?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

How many bytes are used in IPv4 addresses?

A. 4

B. 8

C. 16

D. 32

What is the correct answer?

4

Which default port is used for NNTP?

A. 119

B. 120

C. 121

D. 122

What is the correct answer?

4

Which of the following statements are the correct advantages of a VPN?
a) The destination cannot find your private network as a traffic origin.
b) Communication using VPN is done in an encrypted manner.
c) This is used to hide your identity to protect from hackers.
d) VPN implementation does not require any kind of server.
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are following options that are given below, where can we use full-duplex?
a) Switch to Switch
b) Host to Host
c) Hub to Hub
d) Switch to host
Options:

A. A, B and D

B. A and B only

C. A and D only

D. Only C

What is the correct answer?

4

Which POP command is used to delete a message?

A. DELETE

B. DEL

C. DELE

D. REMOVE

What is the correct answer?

4

IPCONFIG stands for?

A. Internet Protocol Configuration

B. International Protocol Configuration

C. Internet Packet Configuration

D. Internet Process Configuration

What is the correct answer?

4

There are the following options that are given below, which of them can be done through UDP?
a) Trace Route
b) Time Stamp
c) Record Route
d) All the above
Options:

A. A and B

B. B and C

C. A and C

D. D

What is the correct answer?

4

Which default port is used for Redis Server?

A. 3379

B. 4379

C. 5379

D. 6379

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about VPN?
a) VPN stands for Virtual Private Network.
b) It is a technology that is used to create a secured connection over a less secured network.
c) Using the VPN, we can extend our private network using the internet.
d) All of the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

FTP works on which layer of the OSI model?

A. Datalink layer

B. Network layer

C. Transport layer

D. Application layer

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about NVT?
a) The NVT is used for remote login; it defines how data and commands should be sent in the network.
b) It acts as an interface and used to resolve dependencies for remote login between client and server system.
c) The NVT stands for Network Viewer Terminal.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Who was developed NFS?

A. IBM

B. Sun Microsystems

C. Microsoft

D. Oracle

What is the correct answer?

4

Which of the following are the parts of VPN logs?
a) User activities
b) Devices used
c) IP addresses
d) Connection and disconnection timestamps
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following Certificate Authority provides a free DV SSL certificate?

A. Symantec

B. DigiCert

C. Let's Encrypt

D. GlobalSign

What is the correct answer?

4

There are following statements that are given below, which of them are correct about VLAN in computer networks?

A. VLAN is a virtual LAN, it is used to share only files within created LAN

B. VLAN is a virtual LAN which is used to divide a single broadcast domain into multiple broadcast domains

C. VLAN is a virtual LAN, it is used to share only hardware resources within created LAN

D. None of the above

What is the correct answer?

4

Which of the following applications are used for remote login?
a) AnyDesk
b) TeamViewer
c) VNC connect
d) GoToMyPC
Options:

A. A and B

B. A and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about HYBRID topology in computer networks?

A. In the HYBRID topology all devices in a network are connected to a central device

B. The HYBRID topology is the combination of any two network topologies

C. In the HYBRID topology there is no need to required physical cable

D. None of the above

What is the correct answer?

4

Which of the following is responsible for allocating radio resources to the mobile calls?

A. Mobile Station

B. BSC

C. BS

D. None of the above

What is the correct answer?

4

Which of the following protocols are used for email?
a) SMTP
b) POP
c) ICMP
d) IMAP
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, and D

What is the correct answer?

4

Which of the following security mechanism are used for the WiFi network?
a) WEP
b) WPA
c) WPA2
d) WPA3
Options:

A. A and C

B. A and B

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

In which year the telnet protocol was developed?

A. 1965

B. 1969

C. 1972

D. 1988

What is the correct answer?

4

In which year HTTP 1.0 was introduced officially?

A. 1991

B. 1995

C. 1996

D. 1998

What is the correct answer?

4

Which of the following are the components of the FTP Client?
a) Control process
b) Data transfer process
c) User Interface
d) None of the above
Options:

A. A and B

B. A and C

C. A, B, and C

D. D

What is the correct answer?

4

Which layer of the OSI model is responsible for actual physical connections among the network devices?

A. Data Link Layer

B. Network Layer

C. Transport Layer

D. Physical Layer

What is the correct answer?

4

Which of the following protocols are used with HTTPS for security mechanism?

A. SSL

B. TLS

C. Both

D. None

What is the correct answer?

4

What are the elements of PKI?
a) Certificate management system
b) Certificate authority
c) Registration authority
d) SSL certificate
Options:

A. A and B

B. B, C, and D

C. A, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which default port is used for DNS Service?

A. 53

B. 54

C. 55

D. 56

What is the correct answer?

4

In which VTP mode, we can change VLAN information on the switch?

A. Server

B. Client

C. ISL

D. STP

What is the correct answer?

4

There are the following statements that are given below, what are the disadvantages of BUS topology in a computer network.
a) If the main cable is damaged then the complete network will not work.
b) Network disturbance occurs when we add or remove a device into a network.
c) Performance gets decreased when a new node is added to the network.
d) There is a security issue because every node in the network can access the data for other nodes.
Options:

A. A and B

B. B and C

C. C and D

D. A, B, C, and, D