The DNS server configuration file is:
What is spoofing? a. Where a packets claims its source to be other that what its source really is. b. Same as "denial of service" attacks c. Where a machine continually pings another machine d. Where certain broadcasts are passed through a router
what is blue screen error in pc ?
what is the AD value of Static route?(cisco)
Can Area no 0 and area no 1 communicate by default in ospf router without ASBR or ABR routing protocol
Which layer is responsible coordinating communications b/w segments ? a. physical b. data-link c. network d. session e. application
deferances between work group and domain?
Explain routers?
Which layer deals with i) file system transfer ii) ii) virtual terminals emulation iii) interprocess communication. a. Application b. Presentation c. Session d. Transport
True/False: DNS gives you the ability to prevent unauthorized transfers.
senario: There are two switches connected via trunk port.One end station is connected to each switch via access port. All the ports are in same VLAN.All the ports have same speed 1Gbps.Start sending 1Gbps traffic from one end station to other. Determine percentage of traffic received by destination end station.
Consider the IP address 128.252.144.84. What is the network id and what is the node id ? assume classful networking. a. 0.0.0.0 and 128.252.144.84 b. 128.0.0.0 and 252.144.84 c. 128.252.0.0 and 144.84 d. 128.252.144.0 and 84
Port numbers for the following 2 standard services: SMTP, TFTP a. 25, 81 b. 25, 68 c. 23, 69 d. 15, 68 e. 15, 22