What is spoofing?
a. Where a packets claims its source to be other that what its source really is.
b. Same as "denial of service" attacks
c. Where a machine continually pings another machine
d. Where certain broadcasts are passed through a router
Answer / indu
A
NOTE: There is protection built-in in IPv6 to against this.
| Is This Answer Correct ? | 0 Yes | 0 No |
Are you familiar with automounter ?
What are your key strengths as a System/network Administrator?
List the functions of a network administrator?
PLEASE SEND FAQ FOR NETWORK ADMINISTRATOR
senario: There are two switches connected via trunk port.One end station is connected to each switch via access port. All the ports are in same VLAN.All the ports have same speed 1Gbps.Start sending 1Gbps traffic from one end station to other. Determine percentage of traffic received by destination end station.
What IP network addresses are set aside for class A (for private use)? a. 1.0.0.0 (mask 255.0.0.0) b. 10.0.0.0 (mask 255.0.0.0) c. 10.0.0.0 (mask 255.255.0.0) d. 100.0.0.0 (mask 255.0.0.0) e. 100.0.0.0 (mask 255.255.0.0)
In the nsswitch.conf file what does the following entry mean ? NOTFOUND=return
T/F : FDDI specifies protocols at both MAC sublayer and physical layer ?
Which of the following provide correct information about a protocol at the transport layer of the OSI model? * UDP - Provides Connectionless datagrams service * TCP - Provides Connection Oriented Services * SMTP - Provides Mail Exchange * IP - Route determination * TCP - Provides Flow Control and Error Checking * FTP - Transfers of Files
what is Organiser? what is work
Explain the major disadvantage of a star topology?
What routing problems have you troubleshot?