Description : Which tool can be used to perform a DNS zone transfer on Windows? a. DNSlookup b. nslookup c. whois d. ipconfig
Last Answer : b. nslookup
Description : 8. Nslookup can be used to gather information regarding which of the following? A. Host names and IP addresses B. Whois information C. DNS server locations D. Name server types and operating systems
Last Answer : A. Host names and IP addresses
Description : Which of the following of the TCP/IP protocolsis the used for transferring filesfrom one machine to another? A) FTP C) SNMP B) SMTP D) Rpe
Last Answer : A) FTP
Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC
Description : Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? A. FTP B. SNMP C. SMTP D. RPC E. None of the above
Last Answer : SMTP
Description : Which of the following of the TCP/IP protocols is the used for transferring files from one machine to another? A) FTP B) C) SNMP C) SMTP D) D) Rpe
Description : Which of the following of the TCP/IP protocols is the used for transferring files from one machine to another? A) FTP C) SNMP B) SMTP D) Rpe
Description : 1 What is the full form of SNMP A)Simple Network Management Protocol
Last Answer : A)Simple Network Management Protocol
Description : SNMP stand for………… a. Simple network messaging protocol b. Simple network Mailing protocol c. Simple network management protocol d. Simple network Master protocol
Last Answer : d. Simple network Master protocol
Description : Which protocol does hackers use to make their system seems as your system or another allowed host on your network? a. SNMP protocol b. TCP protocol c. ARP protocol d. ICMP protocol
Last Answer : c. ARP protocol
Description : SNMP stands for a. Simple Network Message Protocol b. Simple New Message Protocol c. Simple Network Management Protocol d. Simple Network Managing Protocol
Last Answer : c. Simple Network Management Protocol
Description : SNMP stand for (a) simple network messeging protocol (b) simple network mailing protocol (c) simple network management protocol (d) simple network master protocol
Last Answer : (c) simple network management protocol
Description : SNMP stands for_____ A. Simple Network Messaging Protocol B. Simple Network Mailing Protocol C. Simple Network Management Protocol D. Simple Network Master Protocol
Last Answer : C. Simple Network Management Protocol
Description : What is the full form of SNMP A)Simple Network Management Protocol
Description : Which databases is queried by Whois? a. ICANN b. ARIN c. APNIC d. DNS
Last Answer : a. ICANN
Description : Application layer firewalls works on the application level of the ____stack (i.e. all browser traffic or all telnet or FTP traffic) and may intercept all packets travelling to or from an application: a) TCP b) IP c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : Which is the protocol for performing RPCs between applications in a language and system independent way? (A) Hyper Text Transmission Protocol (HTTP) (B) Simple Network Management Protocol (SNMP) (C) Simple Object Access Protocol (SOAP) (D) Simple Mail Transfer Protocol (SMTP)
Last Answer : (C) Simple Object Access Protocol (SOAP)
Description : Which one of the following is odd? (1) IMAP (2) POP (3) SNMP (4) SMTP
Last Answer : SNMP
Description : Whois known sa Aashu kavi?
Last Answer : RHAPSODIST ?
Description : What is a whois search and how does it work?
Last Answer : Well, WHOIS Search is program that can find information on domain owners and information. It can also be used to figure out the owner of specific websites or domain names for websites.
Description : Whois known as the “Father of Polymer Science?
Last Answer : The German scientist Herman Staudinger
Description : A browser uses the DNS system to convert a domain name into an ip address. But once it has the the ip address how does it know where the server is located and reach the server to download the site?
Last Answer : The point of an ip address is that each one is unique. It’s not unlike an address on an envelope. How does the mail know where to go? There is only one possibility.
Description : Internet explorer is a type of (A) Operating System (B) Compiler (C) Browser (D) IP address
Last Answer : (C) Browser
Description : For 3D modeling of automobile body styling, which of the following is a preferredtechnique a.Constructive Solid Geometry b.Pure Primitive Instancing c.Boundary Representation d.Spatial Occupancy Enumeration
Last Answer : c.Boundary Representation
Description : For 3D modeling of automobile body styling, which of the following is a preferredtechnique? a.Constructive Solid Geometry b.Pure Primitive Instancing c.Boundary Representation d.Spatial Occupancy Enumeration
Description : From the following, which method is also called as the Building Block Approach? a.Cellular Decomposition b.Spatial Occupancy Enumeration c.Generalized Sweeps d.Constructive Solid Geometry
Last Answer : d.Constructive Solid Geometry
Description : What are the advantages and disadvantages of de-factor system of enumeration?
Last Answer : This method has the following advantages: It is not time consuming because the entire enumeration work is done within one night. 2. This is real enumeration because the households are actually present in their places of residence
Description : What is Enumeration?
Last Answer : Enumeration improves code readability. It also helps in avoiding typing mistake
Description : Write code for an enumeration.
Last Answer : public enum animals {Dog=1,Cat,Bear};
Description : During the second week of the months of February and August of each year, an enumeration Is made daily of the number of a) Ordinary UR article of letter mail given out for deliver y by all ... articles of the letter mail, and unregistered parcel given out for deliver y by all post offices .
Last Answer : d) Ordinary un registered articles of the letter mail, and unregistered parcel given out for deliver y by all post offices
Description : Mark correct option related to preservation period a) All records of mail department except due mail & sorting list 1 year b) Book of post marks(MS 18) & Postman book (MS-27) 1 ½ year c) Enumeration returns (MS-6) 2 years d) All monthly statistical registers 3 years e) All of the above
Last Answer : e) All of the above
Description : Mark the correct option a) Half yearly enumeration returns will be submitted during the second week of the months of February and August of each ear 8th to 14th both day inclusive. b) An enumeration ... letter mail and UR parcel given out for delivery to Postman and window. c) All the above
Last Answer : c) All the above
Description : Distinguish a complete enumeration from sample survey
Last Answer : Ans: Complete enumeration is the study of whole population in specified time while sample survey is the statistical study of the part of population.
Description : .................... is the popular method for solving an assignment problem. a. Hungarian Method b. Enumeration Method c. Simplex Method d. None of the above
Last Answer : a. Hungarian Method
Description : Which of the following methods is used to solve an assignment problem: a. Enumeration Method b. Hungarian Method c. Simplex Method d. All of the above
Last Answer : d. All of the above
Description : In the early stages of development of the internet protocol, network administrators interpreted an IP address in ____parts: a) Network Number Portion b) Host Number Portions c) Both of Above d) None of These
Description : An IP address serves which among the following principal functions: a) Host or network interface identification b) Location Addressing c) Both of Above d) None of These
Description : An internet protocol address (IP address) is: a) a numerical label assigned to each device (e.g. computer, printer) participating in a computer network b) It working for the communication c) Both of Above d) None of These
Description : Which among the following is correct: a) An IP address can be private - for use on Local Area Network (LAN). b) It can be use on the internet or other wide area network (WAN). c) IP addresses ... dynamically (assigned by another device on the network on demand). d) All of the Above e) None of These
Last Answer : d) All of the Above
Description : An IP address is a: a) binary number that uniquely identifies computers. b) also identifies other devices on TCP/IP network c) Both of Above d) None of These
Description : The ________is a network layer Internet protocol that provides message packets to report errors and other information regarding IP packet processing back to the source: a) Internet Control Message ... Standard Flexible Message Protocol c) Internet Dynamic Chartered Message Protocol d) None of These
Last Answer : a) Internet Control Message Protocol
Description : What is the address given to a computer connected to a network called? 1) System Address 2) SYSID 3) Process ID 4) IP Address
Last Answer : 4) IP Address
Description : What is the address given to a computer connected to a network called? 1 System Address 2 SYSID 3 Process ID 4 IP Address
Last Answer : 4 IP Address