what is a malicious router?when it occurs?
what is a malicious pacekt ?when it occurs?
Answer / vinod
malicious pacekt is packet send by any Hacker or attacker
which is not noemal. Eg a TCP Normal packet contains its
header with sync, flag, or Ack. source and dest, port so any
packet which states that it is TCP but nt as per standared
TCP format is call malicious pacekt.
| Is This Answer Correct ? | 1 Yes | 1 No |
Which of the following is an invalid host address using a netmask of 255.255.255.192? A.) 10.1.1.1 B.) 10.1.1.66 C.) 10.1.1.130 D.) 10.1.1.127
Tell me how much hold down time of eigrep protocol?
When the router runs out of buffer space, this is called ________. A. Source Quench B. Redirect C. Information Request D. Low Memory
How many Devices does OSPF & EIGRP Support
Hello every one. Please can any one explain me the difference b/w Cisco Switch/ws-c3560-24ps-s and Switch/ws- c3560-24ts-s. what is does PS & TS Stands for. Waiting for your passtive reply. Wish You all the best
what the exact definition of Ethernet.plz reply as soon soon as possible
What do the following statements in an extended access list accomplish? access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21 access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20 access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255 A. This will block ftp traffic. B. This will block http traffic. C. This will permit ftp traffic. D. This will permit tftp traffic.
Can you explain voluntary and compulsory tunnels?
Mention what are the ranges for the private ips?
1.i have to pcs in the network 192.168.1.1 202.55.88.16 2. if that fails shud go through 122.16.1.3 and and if that comes back active it shud go through 202.55.88.16 itself
Which layer is responsible for flow control, acknowledgement, and windowing? A.) Transport B.) Network C.) Application D.) Session E.) Physical F.) Data Link
Explain the major types of networks and explain?