It is advisable not to use telnet because of security problems. Which program should you use instead ?
what command to restore if the boot block is corrupted in linux
What is the difference between X.25 and Frame Relay explain it briefly
how many types of policys in GP(Group Policy)edit
Port numbers for the following 2 standard services: FINGER, POP3 a. 23, 100 b. 25, 109 c. 27, 111 d. 79, 100 e. 23, 109
Which network conforms to IEEE 802.3 specs and is called standard Ethernet ?
A subnet's mask is 255.255.255.224. How many nodes can this subnet have?
Which layer ensures messages reach their destination system via an optimal route (done by planning the route).
diff between /etc/inetd and smf?
what is the sequence of Ensemble Pro services?
What is looping and how switching loops are avoided at L2 level?
I have two switch.Two Uplink ports of a switch is interconnected with other switch.consider uplink port of a switch is 100 Mbps.Now tell me whether bandwidth of uplink port will increase or not.IF it is How much?
Cached ethernet addresses are stored for about 5 minutes and is used to avoid a rebroadcast. This is called ____________ .