Related Questions
What is the correct answer?
4
Which of the following network devices are operated at the physical layer of the OSI model?
What is the correct answer?
4
There are the following options that are given below, which of them are the correct application of UDP to transmit data?
a) SNMP
b) DNS
c) TFTP
d) Routing Information protocol
Options:
What is the correct answer?
4
IPCONFIG stands for?
A. Internet Protocol Configuration
B. International Protocol Configuration
C. Internet Packet Configuration
D. Internet Process Configuration
What is the correct answer?
4
ISDN stands for?
A. Integrated Service Digital Network
B. International Service Digital Network
C. Internet Service Digital Network
D. Intercommunication Service Digital Network
What is the correct answer?
4
There are following statements that are given below, which of them are correct about SMTP?
a) It is an application layer protocol.
b) It is a connectionless protocol.
c) SMTP stands for Simple Mail Transfer Protocol.
d) SMTP is a text-based protocol.
Options:
What is the correct answer?
4
There are the following options that are given below, which of them can be done through UDP?
a) Trace Route
b) Time Stamp
c) Record Route
d) All the above
Options:
What is the correct answer?
4
SNMP stands for?
A. Simple Network Message Protocol
B. Secure Network Message Protocol
C. Simple Network Management Protocol
D. Secure Network Management Protocol
What is the correct answer?
4
What is the full form of MTA used in SMTP?
C. Mail Transmission Agent
What is the correct answer?
4
Which of the following command is used to generate SSH keys in the Linux operating system?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about NFS?
a) The NFS is used to share file system resources over the network.
b) NFS stands for Network File system.
c) NFS is a client/server protocol where File system resources at the server and accessed by the clients.
d) NFS is not a client/ server protocol.
Options:
What is the correct answer?
4
Which default port is used for Tomcat Startup?
What is the correct answer?
4
There are the following options that are given below, which of them are correct parameters of the UDP header?
a) Source Port number
b) Destination Port Number
c) Checksum
d) Flow control Flags
Options:
What is the correct answer?
4
A MAC is also known as?
D. Both physical address and hardware address
What is the correct answer?
4
HTCPCP stands for?
A. Hyper Text Coffee Pot Control Protocol
B. Host Text Coffee Pot Control Protocol
C. HUB Type Coffee Pot Control Protocol
D. Huge Text Coffee Pot Control Protocol
What is the correct answer?
4
There are the following RFC numbers given below which is related HTTPS?
What is the correct answer?
4
Which default port is used for SSL based IMAP?
What is the correct answer?
4
How many bytes are used in IPv4 addresses?
What is the correct answer?
4
Which of the following are key parameters for the service quality of GPRS?
a) Throughput
b) Delay
c) Reliability
d) All of the above
Options:
What is the correct answer?
4
Telnet stands for?
What is the correct answer?
4
The version number of HTTP contains?
a) Major number
b) Minor number
c) UID
d) All the above
Options:
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about HTTP Caching?
A. HTTP caching is used to avoid sending HTTP requests many times for better performance.
B. HTTP caching is used to avoid sending HTTP full response many times for better performance.
What is the correct answer?
4
Which command is used to initiate the SMTP conversation?
What is the correct answer?
4
Why Entity Tags are used in HTTP?
a) It is used to tag each item in the request created by the client.
b) It is used to compare two or more entities from the same requested resource.
c) It is used to download HTML documents.
d) It is used to download CSS documents.
Options:
What is the correct answer?
4
What are the functions of the Certificate Management System?
A. It is used to store the certificate.
B. It is used to validate the certificate.
C. It is used to revoke certificates.
What is the correct answer?
4
Which layer of the OSI model is responsible for connection-oriented services?
What is the correct answer?
4
What is the full form of ETSI?
A. European Telegraph Standard Institute
B. European Telecommunications Standard Institute
C. Eastern Telephonic Standard Institute
D. European Telephonic Standard Institute
What is the correct answer?
4
There are the following statements that are given below, which of them are correct Inverse ARP?
a) The Inverse ARP protocol is used to get the IP address from the MAC address.
b) It is the opposite of ARP.
c) The Inverse is used in only the Linux operating system.
d) All the above
Options:
What is the correct answer?
4
Which part of the URL describes the protocol used in a URL?
What is the correct answer?
4
What is the full form of LiFi?
What is the correct answer?
4
What are the correct protocols used by RING topology?
a) Fiber Distributed Data Interface
b) Token Ring
c) Metro Ring
d) Ticket Ring
Options: