Answer Posted / indu
isolate traffic and limit access
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What are the drawbacks of implementing a ring topology?
how do u share printer through FTP(fire transfer protocol)?
Describe a recent short term stressful situation and how you managed it?
Define proxy servers and how do they protect computer networks?
User Datagram Protocol (UDP) is __ and __ a. connectionless, stateless b. connection-orineted, stateless c. connection-oriented, stateful d. connectionless, stateful
Explain the network architecture?
Is there any website? Which can theft or watch any system or computer hardware drives(memory)while they are accessing Internet.If it is avilable what is it? Please answer me.Advance thanks
Describe the working environment you are currently in, e.g. frequent interruptions, frequent priority shifting, team or individual?
what is Cisco Firewall
VLAN tagging/un-tagging process –where and when it happens?
Tell me what can be done to fix signal attenuation problems?
Explain subnet mask?
What is tunnel mode?
Define nat?
How to manage a network using a router?