A subnet mask is used to mask a portion of the IP address so that TCP/IP can distinguish the __ ID from the __ ID.
how can i login without password through ssh
DCE (distributed computing Environment) is and example implementation of ? a. RPC b. Tranparent bridging c. NFS d. Source Bridge Routing
can we change the MAC address of Network card?
what is uplink?
True or False: The purpose of each layer of the OSI is to provide services to the next lower level?
What are the advantages for XP Service Pack2?
13 Answers Option Matrix InfoTech, Wipro,
Your have a class C network. The IP addresses of your workstations start with 128.251.143 . What is the network address of your network ?
How many Machines can work together in a Workgroup networking? And how many Machines can access together SQL Server running on Machine in Workgroup network??
can we dynamically assign IP address to clints from server without using DHCP
True/False: DNS gives you the ability to prevent unauthorized transfers.
What does RPC do? a. Intercepts DHCP broadcasts b. Broadcasts NETBIOS updates c. Makes remote calls look local d. Makes the use of redirector redundant
What is spoofing? a. Where a packets claims its source to be other that what its source really is. b. Same as "denial of service" attacks c. Where a machine continually pings another machine d. Where certain broadcasts are passed through a router