Answer Posted / amar
1
| Is This Answer Correct ? | 23 Yes | 0 No |
Post New Answer View All Answers
What can be considered as good passwords?
How would you monitor and maintain the local area network, email, internet & intranet systems to ensure data security and prevent occurrence of faults?
Explain how to securing a computer network?
Suppose when you move the nic cards from one pc to another pc, does the mac address gets transferred as well?
What is the importance of authentication?
Explain the role of ieee in computer networking?
Response of switch when we send different vlan data from different port using same mac id.
HI all of u dear freind i dont know abot u but instead of i want to requeste to all , if u have any job in ur mind than pls contact me or forword me . i hv complet my B.A. , CCNA ,MCSA, my contact no 09958737018 and id is mak_alam000@rediffmail.com , ur freind maksud alam
senario: There are two switches connected via trunk port.One end station is connected to each switch via access port. All the ports are in same VLAN.All the ports have same speed 1Gbps.Start sending 1Gbps traffic from one end station to other. Determine percentage of traffic received by destination end station.
whenever we give #metastat cmd in svm, it display output "need to maintain" state, what u do?
when affected the system from virus , which paths will be it stored in system ?
How frequent the STP information will be exchanged
How maximum networks and hosts are in a class a, b and c network?
What is the last major networking problem you troubleshot and solved on your own in the last year?
Define ipconfig?