What is spoofing?
a. Where a packets claims its source to be other that what its source really is.
b. Same as "denial of service" attacks
c. Where a machine continually pings another machine
d. Where certain broadcasts are passed through a router
Answer / indu
A
NOTE: There is protection built-in in IPv6 to against this.
| Is This Answer Correct ? | 0 Yes | 0 No |
suppose you have 1000 systems to assign Ip address when will you do , and why
Which OSI layer uses ports and sockets ? a. Application b. Presentation c. Session d. Transport
What is mean by MAC ?
Dynamic routing is started by the which script .
Name 4 kinds of DNS servers ?
Your Ultra 1 has a 100Mbps Fast Ethernet Card. What is the name of the interface ?
which layer converts user input into data ? a. application b. presentation c. session d. transport
Your previous Network Administrator had subnetted your network into many subnets. Only info you have is that one of the hosts IP was 200.252.144.33 and the mask was 255.255.255.240. Which class network is it ? How many bits are being subnetted ? What is the broadcast address ? a. B, 28, 255.255.255.47 b. C, 20, 255.255.255.47 c. C, 28, 255.255.255.47 c. C, 28, 255.255.255.32
You want sendmail to attempt to re-deliver previously undelivered mail (e.g. the receving mail server was down) every 30 minutes. Which option and value would you use with the sendmail deamon ?
A subnet mask is used to mask a portion of the IP address so that TCP/IP can distinguish the __ ID from the __ ID.
Which layer ensures messages reach their destination system via an optimal route (done by planning the route).
How long does an entry stay in the arp table by default ?