Can you explain the difference between trusted and untrusted
networks?
Answers were Sorted based on User's Feedback
Answer / rachna tripathi
Trusted/untrusted network means protocol working on TCP or
udp protocol. tcp means-transmission control protocol which
is reliable, receive acknowledgment and connection oriented
prototocol.
UDP means user datagram protocol which io non reliable ,does
not receive acknowledgement and connection less protocol. so
which application is running on TCp protocol which is
reliable or which protocol is not working on tcp that is not
reliable.
| Is This Answer Correct ? | 7 Yes | 6 No |
Answer / guest
trusted network meant a site have security and able to
control a firewall is website
untrusted site since in unsafe web site
| Is This Answer Correct ? | 4 Yes | 4 No |
Station A is transmitting data to station B faster that station B can handle it. When station B's buffer fills up, it send out a message to station A to stop sending data. After B empties out its buffer, station B sends a message to station A to start sending data again. This is most directly an example of (pick the best answer only): A.) Poison Reverse B.) Connectionless protocol C.) Windowing D.) Connection oriented protocol E.) Flow Control F.) Split Horizon
What does CCNA stand for? A. Cisco Certified Network Administrator B. Cisco Certified Network Associate C. Certified Circuitry in Networking Apprentice D. Calico Cats of North America
WAN stands for which of the following? A.) Wide Arena Network B.) World Area Network C.) Wide Area News D.) Wide Area Network
Which two protocol tools use ICMP? (Choose two) A. ping B. telnet C. configure D. traceroute E. show commands F. standard access lists
You need to come up with a TCP/IP addressing scheme for your company. How many network IDs must you allow for when you define the subnet mask for the network? A.) One for each WAN link B.) One for each router interface C.) One for each NIC installed in each client D.) One for each subnet with hosts E.) One for each host ID
Which of the following are solutions to the problems encountered with Distance-Vector routing? A.) Defining a Maximum B.) Poison Reverse C.) Triggered Updates D.) Shortest path first algorithm. E.) Split Horizon
Identify 3 characteristics of an IP address? A.) Contains a network portion and a host portion B.) 32 bits long C.) Unique to each network D.) Part of the default Cisco configuration E.) Referred to as the hardware address
Which command specifies a second subinterface on serial interface 0? A. interface s 0.2 point-to-point B. interface 2 s.0 point-to-point C. suberinterface 2.s 0 point-to-point D. interface s 0 sub 2 point-to-point E. interface s 0.1 point-to-point sub 2
Which statement is true regarding half duplex? A.) Only works in a point-to-point configuration B.) Allows for transmitting and receiving but not a the same time C.) Allow for transmitting and receiving of data simultaneously D.) Doubles the bandwidth
What is the IEEE specification for Spanning Tree Protocol? A.) 802.9 B.) 803.ud C.) 803 D.) 802.1d
Identify the OSI layer responsible for end-to-end connections? A.) Network B.) Transport C.) Session D.) Data link E.) TCP
In transport layer, for connection oriented communication Three way handshake process is there to establish a connection. So question is that, when a host send an ACK messages to another host with host intend to establish a connection, the source host send it as Broadcast or unicast message? Cud anyone explain this. Thanks in advance.