What is spoofing?
a. Where a packets claims its source to be other that what its source really is.
b. Same as "denial of service" attacks
c. Where a machine continually pings another machine
d. Where certain broadcasts are passed through a router
Answer Posted / indu
NOTE: There is protection built-in in IPv6 to against this.
|Is This Answer Correct ?||0 Yes||0 No|
Which application protocol can not be blocked by the Switch?
Explain 802.1Q header?.
how i can Design a client–server network with two servers operating at 100Base- T Fast Ethernet speed and the clients operating at regular 10Base-T Ethernet speed using a 10/100 Mbps NIC. The hub is located in a wiring closet, but the servers and clients are not. Assume that a satisfactory performance is achieved at 40% utilization of the LAN.
I am to introduce a new financial product through nationalised Banks.How I could monitor the dealings,ie.payment made or withdrawn from the accounts of our clients and how the customers could read the details of their accounts through the mobiles.
What is the Multicast address used in STP ?
Do you know what protocols fall under the tcp/ip internet layer?
Define mesh topology?
What is the importance of authentication?
Is there any website? Which can theft or watch any system or computer hardware drives(memory)while they are accessing Internet.If it is avilable what is it? Please answer me.Advance thanks
Define tunnel mode?
how to set tunneling in putty when any portno blocked from firewall to use resources with that portno like ssh 22
What can be considered as good passwords?
why we r going to freezing service group and system, what are the freezing steps & how to freezing service group?
Define proxy servers?
What is the major disadvantage of a star topology?