How to securing a computer network?
No Answer is Posted For this Question
Be the First to Post Answer
Which application protocol can not be blocked by the Switch?
Which file holds the netmask number ?
what is paradoxing in neworking
HI all of u dear freind i dont know abot u but instead of i want to requeste to all , if u have any job in ur mind than pls contact me or forword me . i hv complet my B.A. , CCNA ,MCSA, my contact no 09958737018 and id is mak_alam000@rediffmail.com , ur freind maksud alam
Which protocol does "ping" use ?
What is a collection of networks and routers under a single administrative control.
UDP runs its own ? a. data-link layer protocols b. CRC c. routing d. Acknowledgements
Can we run STP and RSTP in a same box?
Port is where upper layer protocols access which layer ? a. data-link b. network c. transport d. session
what is the syntax to shut down a client system from the server
Which OSI layer uses segments? a. Application b. Presentation c. Session d. Transport
In the nsswitch.conf file what does the following entry mean ? NOTFOUND=return