Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Which layer is used to route packets


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More Networking AllOther Interview Questions

What is the difference between process and thread ? also what is the difference between process and service >

2 Answers   ABC,


1. What ports does FTP traffic travel over? 2. What ports does mail traffic utilize? 3. What ports do HTTP and HTTPS use? 4. Why is NTP required in an NFS network? 5. Name some common mal software on the server side 6. What is CPAN? How do you access it? 7. What is PEAR? 8. What advantages does mod_perl have over a perl CGI? 9. What is required to do SSL in Apache 1.x? 10. What is Tcl? 11. What is a servlet engine/container? 12. What is BIND? 13. Name the steps to setup a slave zone in BIND 14. Name the steps to setup a primary zone in BIND 15. What commands would you use under Solaris or Linux to modify/view an LDAP tree?

0 Answers   TCS,


what is the use of PING command?

5 Answers   Genpact,


What is a router?

21 Answers   iGate, Wipro,


Explain 5-4-3 rule?

1 Answers   Elgi Equipments,


what is DHCP in networking clear it properly pls

4 Answers  


What are the reasons for using layered protocols ?

0 Answers  


What is Kerberos?

3 Answers   Cap Gemini, Elgi Equipments, TCS,


What is the benefit of Active Directory ?

1 Answers  


not able to connect to SBI Visa payment server...Getting message like "Server not found"...."proxy protected by firewall"....how to resolve this issue?

1 Answers   TCS,


where can we see the OS in the system?

4 Answers   Patni,


How do cryptography-based keys ensure the validity of data transferred across the network?

1 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)