What is spoofing?
a. Where a packets claims its source to be other that what its source really is.
b. Same as "denial of service" attacks
c. Where a machine continually pings another machine
d. Where certain broadcasts are passed through a router
Answer / indu
A
NOTE: There is protection built-in in IPv6 to against this.
| Is This Answer Correct ? | 0 Yes | 0 No |
Mail messages remain on the server while being manipulated by client. This is the _______ type mail access supported by IMAP4.
what is the difference between between win 2000 and win 2003 and win 2008
Which 3 layers are missing in TCP/IP ? a. Physical b. data link c. network d. transport e. session f. presentation g. application
How to securing a computer network?
You mail server belongs to mydomain.com . An email is destined for user@host2 . The destination domain name is not known. This type of email address is ?
The process of units of data being broken into smaller units is called
Sequence Number in a TCP header is used for (list all that apply) a. acknowledgements b. upper layer information c. reordering of the octets received d. protocol dependent information e. rejecting the duplicate octates
A server who performs processing for client computers is called? a. application server b. file/print server
Explain Application Layer with the help of application layer protocol?
11 Answers Cisco, DELL, Google,
Windows and Linux interoperability how to ?
What algorithm does RIP use to determine the best route ?
What is the difference between X.25 and Frame Relay explain it briefly