Answer Posted / shailandra prakash trivedi
A firewall is a secure and trusted machine that sits between
a private network and a public network.
Access Control List is a list of permissions attached to an
object.The list specifies who or what is allowed to access
the object and what operations are allowed to be performed
on the object.
| Is This Answer Correct ? | 5 Yes | 3 No |
Post New Answer View All Answers
Explain any three error detection and correction techniques.
Explain Any Standalnoe Application with rispect to OSI model, letus Consider Voice Recognition....!! One Has To tell function of all layers with rispect to given Application.
Explain different kinds of Switching techniques.
What is a Multi-homed Host
What is source route
How to make a port to a dedicated port through dll registration in a windows system
1.Explain the main purpose of IP address? 2.List two purposes for a web browser? 3.Explain an advantage and a disadvantage of multiple search engines? 4.Describe two roles of Internet Services Providers (ISPs)?
Write a short note on ISDN?
What is tdm?
Give two examples of a ‘collision-free’ protocol ?
Differentiate between stop-and wait ARQ and Go-back-N protocol.
Discuss Shannon’s capacity. What implications does it have ?
Explain 1-persistent, p-persistent and 0-persistent CSMA giving strong and weak points of each.
The physical layer service is a non-confirmed service. Assume that some bits of data are lost during transmission over physical media, which layer will detect the loss and take some remedial measures. Explain any one method clearly depicting how this operation is performed.
On a nexus, is the metric-type keyword not available in the "default-information originate" command?