If A sends a message to B with encryption then key is a)A public key b)B public key c)A private key d)B private key
2 54111. What ports does FTP traffic travel over? 2. What ports does mail traffic utilize? 3. What ports do HTTP and HTTPS use? 4. Why is NTP required in an NFS network? 5. Name some common mal software on the server side 6. What is CPAN? How do you access it? 7. What is PEAR? 8. What advantages does mod_perl have over a perl CGI? 9. What is required to do SSL in Apache 1.x? 10. What is Tcl? 11. What is a servlet engine/container? 12. What is BIND? 13. Name the steps to setup a slave zone in BIND 14. Name the steps to setup a primary zone in BIND 15. What commands would you use under Solaris or Linux to modify/view an LDAP tree?
2810How can we enable the USB pen drive in Network if Network administrator Disable the Drive. Asume You are Computer administrator but when you enable it it show windows can't enable this dirve.
7 26616not able to connect to SBI Visa payment server...Getting message like "Server not found"...."proxy protected by firewall"....how to resolve this issue?
1 4313Post New TCS Networking AllOther Interview Questions
How do I turn off javascript in chrome?
Why id selector is faster than class?
Tell us what is the definition of keyword?
What is difference between delivery document & scheduling?
What is the difference between the broad match and narrow match?
QUESTION IS THAT DURING UPLOADING DATA IN PROD SERVER,OUR EQUIPMENT TAG NUMBERS ARE NOT MATCHING WITH SAP TAG NUMBERS SO DUE TO THIS WE ARE FACING PROB, BECAUSE WHENEVER ALARM IS COMING FROM SCADA DUE MISMATCH THE NOTIFICATION IS NOT CREATED IT IS GIVING ERROR. PLEASE SUGGEST THE METHOD SO THAT THE TAG NUMBERS OF BOTH (SCADA EQUIPMENT AND SAP EQUIP) SHOULD CONCIDE.OTHERWISE WE HAVE TO GO FOR LONG PROCESS EITHER BY INTERFACE TABLE OR BY EXPORTING ALL DATA AND MAKING RIGHT CHANGES.DO YOU HAVE ANY SHORTCT METHOD PL WRITE ME. THANKS
What is a Stack? Explain with example?
Explain TestSetup annotation?
What's the servlet interface?
How to generate a protected disk image containing your csr, private key and development certificate in iphone development?
Mention what happens if the preferred replica is not in the ISR?
How can you ensure transparency and accountability in an AI system?
How to modify existing triggers using "alter trigger"?
What is the difference between call transaction and session method? : abap bdc
how many running meters in one kilogram of 4mm pvc coated chainlink fencing