If A sends a message to B with encryption then key is a)A public key b)B public key c)A private key d)B private key
2 52431. What ports does FTP traffic travel over? 2. What ports does mail traffic utilize? 3. What ports do HTTP and HTTPS use? 4. Why is NTP required in an NFS network? 5. Name some common mal software on the server side 6. What is CPAN? How do you access it? 7. What is PEAR? 8. What advantages does mod_perl have over a perl CGI? 9. What is required to do SSL in Apache 1.x? 10. What is Tcl? 11. What is a servlet engine/container? 12. What is BIND? 13. Name the steps to setup a slave zone in BIND 14. Name the steps to setup a primary zone in BIND 15. What commands would you use under Solaris or Linux to modify/view an LDAP tree?
2751How can we enable the USB pen drive in Network if Network administrator Disable the Drive. Asume You are Computer administrator but when you enable it it show windows can't enable this dirve.
7 26169not able to connect to SBI Visa payment server...Getting message like "Server not found"...."proxy protected by firewall"....how to resolve this issue?
1 4178Post New TCS Networking AllOther Interview Questions
For a NMOS transistor acting as a pass transistor, say the gate is connected to VDD, give the output for a square pulse input going from 0 to VDD
What is dhtml in computer?
For what purpose, user will be using ‘continue on’ error?
What platforms can I automate VSS using OLE?
which cationic polymer is compatible with poly aluminium chloride?
what is a format pane in Tableau?
What is thermite mixture?
What is the difference between varchar and nvarchar datatypes?
How are time delays calculated in the 8085?
Does google use django?
What are the supported data types in python?
What do you know about jcl?
How do you find duplicates in conditional formatting?
What is max pool size?
What research methodologies do you favor?