Explain in mobile and computer and home is it possible that we see and listen person voice and activity carefully for destroying their privacy?
explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)
What is difference between discretionary access control and mandatory access control?
What is classful and classless routing?
Diff bet ripv1 & ripv2?
How many layers are under tcp/ip?
Define ipv6?
Suppose when you move the nic cards from one pc to another pc, does the mac address gets transferred as well?
Define proxy servers and how do they protect computer networks?
Define nat?
Define slip?
Give some private network addresses examples?
Tell me what is the equivalent layer or layers of the tcp/ip application layer in terms of osi reference model?
Is it possible to connect two computers for file sharing without using a hub or router?
Explain subnet mask?