What is spoofing?
a. Where a packets claims its source to be other that what its source really is.
b. Same as "denial of service" attacks
c. Where a machine continually pings another machine
d. Where certain broadcasts are passed through a router
Answer / indu
A
NOTE: There is protection built-in in IPv6 to against this.
Is This Answer Correct ? | 0 Yes | 0 No |
Define lan?
Define proxy servers?
What protocol would you include to manage your network ? a. SNMP b. NetBEUI c. CHAP d. IPX
What IP network addresses are set aside for class C (for private use) ? a. 172.16.0.0 (mask 255.240.0.0) b. 172.16.0.0 (mask 255.255.0.0) c. 196.168.0.0 (mask 255.255.0.0) d. 192.168.0.0 (mask 255.255.0.0) e. 198.168.0.0 (mask 255.255.255.0)
Which command tells the state of the Ethernet interfaces ?
Suppose if a network which contains two servers and twenty workstations, where is the best place to install an anti-virus program?
Which of the follwoing are Layer2 protocols ? Choose all that apply. a. HDLC b. IP c. UDP d. SLIP e. PPP
Host A is connected to Router B. Router B is connected to Router C. Router is connected to Host D. How many hops away is Host D from Host A ?
What is switch, frame, packets and bits plz give me detail idea about it and which layer it is used
main roll of network administrator
how to know how many samba users in solaris?
A cyclical redundancy check (CRC) is usually contained in a packet's ?