|
Related Questions |
View Answer |
|
for a small lan which class of addressing is used?
|
View Answer
|
|
Difference between discretionary access control and mandatory access control?
|
View Answer
|
|
How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?
|
View Answer
|
|
How do you do authentication with message digest(MD5)? (Usually MD is used for finding tampering of data)
|
View Answer
|
|
How do you use RSA for both authentication and secrecy?
|
View Answer
|
|
What is ARP and how does it work?
|
View Answer
|
|
Explain Kerberos Protocol ?
|
View Answer
|
|
What are digital signatures and smart cards?
|
View Answer
|
|
What is the role of Single Sign On in authentication technologies?
|
View Answer
|
|
What are all the technical steps involved when the data trasmission from server via router?
|
View Answer
|
|
How hash function works in router
|
View Answer
|
|
Different between broadcast domain and collision domain. or explian broadcast domain and collision domain.
|
View Answer
|
|
What does CIA stand for in security management?
|
View Answer
|
|
What is classful and classless routing ? Diff bet RIPv1 & RIPv2 ? What is multicasting ? What is VLSM ?
|
View Answer
|
|
Basis for OSPF protocol
|
View Answer
|
|
What is meant by port blocking within LAN ?
|
View Answer
|
|
What is difference between ARP & RARP ? How both of these protocols will work, and where it will use ?
|
View Answer
|