How to securing a computer network?
No Answer is Posted For this Question
Be the First to Post Answer
X windows maps to which OSI layer ? a. application b. presentation c. session d. transport e. network
what is cmrr?
TCP is _ and _ ? a. connectionless, stateless b. connection-orineted, stateless c. connection-oriented, stateful d. connectionless, stateful
Which protocol is used typically within an AS ?
You see the following subnet addresses ; what is the subnet mask ? 252.4.0 252.8.0 252.12.0 252.16.0 a. 255.255.255.0 b. 255.255.192.0 c. 255.255.240.0 d. 255.255.252.0
Scenario: “In a switch two hosts are connected to port number 1 and 2 respectively; both the ports are configured with same VLAN id. When data is sent from one host to another, in switch VLAN tagging will happen or not? Why?”
3 types of mail access supported by IMAP4 are:
Which init script starts the inetd daemon ?
You have a Class C network. You have subntted it into 6 subnets. What is the subnet mask ?
Which command shows the routing table of a Solaris Machine ?
RFC 1542 compliant ROUTERS pass what ? a. DHCP broadcasts b. RIP broadcasts c. RIP2 broadcasts d. multicast packets
Define the proper termination rate for utp cables?