Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Which program will check if sendmail can determine the system's fully-qualified host name ?



Which program will check if sendmail can determine the system's fully-qualified host name ?..

Answer / indu

/usr/lib/mail/check-hostname

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More Networking Administration Interview Questions

Which layer is responsible for providing mechanisms for multiplexing upper-layer application, session establishment, and tear down of virtual circuits? * Session * Network * Physical * Transport * Application * Presentation

5 Answers   Cisco, IBM,


Explain 802.1Q header?.

0 Answers   HCL,


X windows maps to which OSI layer ? a. application b. presentation c. session d. transport e. network

1 Answers  


What protocol is used to convert IP addresses to MAC addresses ? a. IP b. ARP c. RARP d. InARP e. appletalk

1 Answers  


what is an operating system?what are the functions of operating system?give examples of operating system for worsation(clients)and network operating system?

1 Answers  


what is diffrents betweeen ntfs and fat ?

6 Answers   Infosys, PCS,


Response of switch when we send different vlan data from different port using same mac id.

0 Answers   HCL,


The following are the steps toward encapsulation. Put them in order: 1. User input 2. data 3. frame 4. segment 5. datagram 6. bits a. 1-4-2-5-3-6 b. 1-5-4-2-3-6 c. 1-2-3-5-4-6 d. 1-2-4-5-3-6

1 Answers  


Network adapter card drivers reside in the which sub-layer of the Data Link layer of the OSI model.

1 Answers  


How do you check the listening ports on a windows box? Command line.

6 Answers   CSC,


What is spoofing? a. Where a packets claims its source to be other that what its source really is. b. Same as "denial of service" attacks c. Where a machine continually pings another machine d. Where certain broadcasts are passed through a router

1 Answers  


Define multicast routing?

0 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)