It is advisable not to use telnet because of security problems. Which program should you use instead ?1 1837
Which freeware program will let you have fine-grain control over which machines can or can not telnet/rlogin into your machine ?1 1497
You have an account in your machine with user id of 0, but it is not root. Will this user have superuser previleges ?1 1872
What is called a set of physically connected computers in relatively small physical area.1 1506
In network topology what is called as one large coaxial cable joins all the computers.1 1453
Which topology, uses centralized hub from which a number of signals carrying cables goes out to individual devices on the branch.1 1626
Which topology is like the star topology except output node connects to the input of the next node.1 1536
What is a device that amplifies and regenerates the data signal bit by bit.1 1686
repeator, bridge, switch, router, gateway, or hub are examples of1 1694
ATM uses howmany bytes long cells.1 1746
Which option of the snoop command tells it to be verbose ?1 1791
Which option of the snoop command tells it to display from a host ?1 1870
Which command tells the state of the Ethernet interfaces ?1 1628
Your Ultra 1 has a 100Mbps Fast Ethernet Card. What is the name of the interface ?1 2096
Which command displays information about network interface hme0 ?1 1758
Please list the types of Firewalls, Routers, Switches, Servers, you manage?
How do two computers communicate with each other when they are connected through L2 or L3 switch?
What is arp main job?
Describe profile in terms of networking concept?
what command to restore if the boot block is corrupted in linux
Give the importance of the osi physical layer?
when affected the system from virus , which paths will be it stored in system ?
What is the last major networking problem you troubleshot and solved on your own in the last year?
how to check veritas install or not
what solution for High Utilization Cisco router 2851 ? please Need Help ASAP.
How many layers are under tcp/ip?
Purpose of TTL. How it gets modified.
VLAN tagging/un-tagging process –where and when it happens?