If A sends a message to B with encryption then key is a)A public key b)B public key c)A private key d)B private key
2 35241. What ports does FTP traffic travel over? 2. What ports does mail traffic utilize? 3. What ports do HTTP and HTTPS use? 4. Why is NTP required in an NFS network? 5. Name some common mal software on the server side 6. What is CPAN? How do you access it? 7. What is PEAR? 8. What advantages does mod_perl have over a perl CGI? 9. What is required to do SSL in Apache 1.x? 10. What is Tcl? 11. What is a servlet engine/container? 12. What is BIND? 13. Name the steps to setup a slave zone in BIND 14. Name the steps to setup a primary zone in BIND 15. What commands would you use under Solaris or Linux to modify/view an LDAP tree?
2058How can we enable the USB pen drive in Network if Network administrator Disable the Drive. Asume You are Computer administrator but when you enable it it show windows can't enable this dirve.
7 21727not able to connect to SBI Visa payment server...Getting message like "Server not found"...."proxy protected by firewall"....how to resolve this issue?
1 2857Post New TCS Networking AllOther Interview Questions
What are the different types of mapping that can be used in PI?
How does impala process join queries for large tables?
Describe the command object and its method.
Tell me what sized websites have you worked on in the past?
difference between manager access and designer access?
what pressure the NP2 class RCC pipe can sustain?
What are the types of assignment statements?
What are predicates in java 8?
How you edit the script?
What is the configuration of systems when using load runner?
Is Nodejs client side or server side language?
What is silverlight tool kit?
How to delete existing rows in a table?
Write an html code to create an e-mail link?
Explain overhauling stopsfor backpull our pumps?