Networking Protocols (671)
Networking Administration (1008)
Networking Security (196)
Networking General (266)
Networking AllOther (430) A System programmer have access to computer room, it is possible that he may undertake some unauthorised activities at any time, due to his deep knowledge how can a control build to avoid the risk?
3 7258when a computer is restart,it will not show startup screen and instead a Beep sound is continuosly appearing,what could be the reason and there are important files and folders present in the system.what should be needed to do to bring the system to its normal state?
8 9444what is the name of the Jack used for Network Setup between one computer to Another and from computer to another device?
2 5011Is it possible for a User to change Admin Password who is not a part of Admin group if so how is it possible?
2 5220
Please inform me about the openings of networking field at Kolkata.Is there any interview recently?
How do I know if my ftp port 21 is blocked?
How are networks classified based on their connections?
What are the main advantages of routing in switched network technique?
Explain which layer is closer to the user?
What is backbone network?
When we make a call from mobile/landline, how exactly the backend architecuture works?
Why does network standardisation carry so much importance?
What are the various ways in which we can add users in CUCM?
How does arp response the request?
Explain what are the networking protocol options for the windows clients if for some reason you do not want to use tcp/ip?
Describe the working environment you are currently in, e.g. frequent interruptions, frequent priority shifting, team or individual?
When troubleshooting computer network problems, what common hardware-related problems can occur?
Explain how is ip carried on a network?
One way of securing a network is through the use of passwords. What can be considered as good passwords?