Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


what is a malicious router?when it occurs?
what is a malicious pacekt ?when it occurs?



what is a malicious router?when it occurs? what is a malicious pacekt ?when it occurs? ..

Answer / vinod

malicious pacekt is packet send by any Hacker or attacker
which is not noemal. Eg a TCP Normal packet contains its
header with sync, flag, or Ack. source and dest, port so any
packet which states that it is TCP but nt as per standared
TCP format is call malicious pacekt.

Is This Answer Correct ?    1 Yes 1 No

Post New Answer

More CCNA Interview Questions

Which of the following is an invalid host address using a netmask of 255.255.255.192? A.) 10.1.1.1 B.) 10.1.1.66 C.) 10.1.1.130 D.) 10.1.1.127

3 Answers  


Tell me how much hold down time of eigrep protocol?

0 Answers  


When the router runs out of buffer space, this is called ________. A. Source Quench B. Redirect C. Information Request D. Low Memory

2 Answers  


How many Devices does OSPF & EIGRP Support

5 Answers   HCL,


Hello every one. Please can any one explain me the difference b/w Cisco Switch/ws-c3560-24ps-s and Switch/ws- c3560-24ts-s. what is does PS & TS Stands for. Waiting for your passtive reply. Wish You all the best

2 Answers  


what the exact definition of Ethernet.plz reply as soon soon as possible

7 Answers  


What do the following statements in an extended access list accomplish? access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21 access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20 access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255 A. This will block ftp traffic. B. This will block http traffic. C. This will permit ftp traffic. D. This will permit tftp traffic.

1 Answers  


Can you explain voluntary and compulsory tunnels?

0 Answers   CCIE,


Mention what are the ranges for the private ips?

0 Answers  


1.i have to pcs in the network 192.168.1.1 202.55.88.16 2. if that fails shud go through 122.16.1.3 and and if that comes back active it shud go through 202.55.88.16 itself

1 Answers  


Which layer is responsible for flow control, acknowledgement, and windowing? A.) Transport B.) Network C.) Application D.) Session E.) Physical F.) Data Link

2 Answers  


Explain the major types of networks and explain?

0 Answers  


Categories