It is advisable not to use telnet because of security problems. Which program should you use instead ?
when affected the system from virus , which paths will be it stored in system ?
what is L1 and L2 support
12 Answers Banking, Cognizant, Computronics, CSC, Goldman Sachs, HCL, HP, L&T, Orange, Wipro,
How long is MAC address (bytes) ? How may bytes identifies the vendor? a. 8,2 b. 6,3 c. 8,4 d. 6,2
one client is uanble to connect web server it is located in some remote location what are the problems how to troubleshoot the problem
Host ----router ----server Class B network. host's IP : ...82.2 , Mask: 255.255.240.0 router's left IP-address is ...64.1 router's right IP-address is ...32.1. Why can the host not access the server ?
What does the MAC sublayer of the Data Link Layer do ? (choose all that apply) a. builds frames b. checks to see that nothing got damaged in transit by CRC c. determines "which machine goes first on the wire" d. provides path to the destination host e. Gets data on and off the wire
List 2 available "actions" that can be specified in the nsswitch.conf file .
WHICH CETIFICATION IS MORE IMPORTENT FOR FRASHER GUAI IN MCSE ,CCNA ?
Which Protocol was developed to overcome limitations of EGP.
T/F: 802.3 can not "see" upper layers.
Which command will display the entire RAP table ?
Explain private ip address?