Hi, Shahin
Thanks a lot for providing me these sites. These links are
really helpful for me. r u working somewhere please let me
know
Answer Posted / jitendera kuamr sinha
as per my knowledge is consern he is not working any where
but he have knowledge more then the working person.ok shain
tarif bhaut ho gaye tumhare fool mat jana ha ha ha ha ha ha ah
i know only one guy who is link master if you ask any thing
to him he will provide link to you his name is suddep one of
the my best friend through all interview and now 2nd is shain
good mughe bhi ccpfa ka link bhej dena
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
Why subnetting is used?
Mention the conversion steps of data encapsulation?
How many types of ends in wan?
What is the difference among straight cable, cross cable and rollover cable?
How many types of memories are used in cisco router?
What are the different types of VPN?
Which protocol used before part of ccna?
What does routing mean?
which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?
In stead of 0.0.0.0 wild card mask what you can write after ip?
Tell me which cable we connect in db-9?
Which cable we connect in db-9?
What is the minimum request timer?
Which protocol supenetting is enable by default?
In IPSec what is SAD, SPD and SA's?