Explain what are all the technical steps involved when the data transmission from server via router?
544Explain what is difference between arp & rarp? How both of these protocols will work, and where it will use?
539Explain in mobile and computer and home is it possible that we see and listen person voice and activity carefully for destroying their privacy?
512explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)
485Post New Networking Security Questions
How the telecommunicaton is working?I have heared that one control will be there for asia countries for other countries there will be another,what is that how they work?
In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?
What is the idea behind the Bell-La Padula model?
What is Imaging/ghosting?
What is frame relay, in which layer it comes
What are the main components of the CERT Taxonomy?
What is site-to-site vpn?
What are the data units at different layers of the TCP / IP protocol suite
What is udp flood?
What is the general data protection regulation (gdpr)?
What is Cross site scripting?
What is intrusion prevention systems (ips)?
Which are the different factors that affect the security of a network?
How does a virtual private network (vpn) work?
What is the difference between a switch and a hub?