How to securing a computer network?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More Networking Administration Interview Questions

X windows maps to which OSI layer ? a. application b. presentation c. session d. transport e. network

1 Answers  


what is cmrr?

4 Answers   Mphasis,


TCP is _ and _ ? a. connectionless, stateless b. connection-orineted, stateless c. connection-oriented, stateful d. connectionless, stateful

1 Answers  


Which protocol is used typically within an AS ?

1 Answers  


You see the following subnet addresses ; what is the subnet mask ? 252.4.0 252.8.0 252.12.0 252.16.0 a. 255.255.255.0 b. 255.255.192.0 c. 255.255.240.0 d. 255.255.252.0

1 Answers  






Scenario: “In a switch two hosts are connected to port number 1 and 2 respectively; both the ports are configured with same VLAN id. When data is sent from one host to another, in switch VLAN tagging will happen or not? Why?”

0 Answers   HCL,


3 types of mail access supported by IMAP4 are:

1 Answers  


Which init script starts the inetd daemon ?

1 Answers  


You have a Class C network. You have subntted it into 6 subnets. What is the subnet mask ?

1 Answers  


Which command shows the routing table of a Solaris Machine ?

1 Answers  


RFC 1542 compliant ROUTERS pass what ? a. DHCP broadcasts b. RIP broadcasts c. RIP2 broadcasts d. multicast packets

1 Answers  


Define the proper termination rate for utp cables?

0 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)