How we ping ICMP a NIC with a correct IP address but with wrong MAC address Do all NIC's can run inpromiscuous mode
3 7536as we know that isdn bri port come with either a u interface or some thing s/t interface what is the diffrenmce between them
2 4368Request any body to explain the parameters of Ipsec vpn tunnel while creating a tunnel in Cisco ASA.
3 5994from last ten days i watched that no any new questions are placed in ccna catogarey.so plz place the questions it is very use full to beginers like us
2 4113In transport layer, for connection oriented communication Three way handshake process is there to establish a connection. So question is that, when a host send an ACK messages to another host with host intend to establish a connection, the source host send it as Broadcast or unicast message? Cud anyone explain this. Thanks in advance.
3 7380Hi Jitendera, Wat do u do..?? I mean r u working anywhere???? Basically where r u from??? If u don't hv any problem, u can say..?? Or else mail me mr.shahin07@gmail.com
2516what is leased line and if any issue occur what will u do thai is trouble shootin occurs let leased line is down
1 9593Post New HCL CCNA Interview Questions
What is the Managed meta data Service?
Why is the necessity of devops?
Change the url for a hyperlink using jquery?
Explain the savepoint statement.
If while installing a package with pip, you get the error no matching installation found, what can you do?
Are you willing to work overtime at Ross Stores?
1)How to calculate AC Capacity for the Room?
How to use element in xslt? : xslt
What is key figure? : cost center accounting
What is Buckets in Hive?
Which one is more efficient in terms of required memory space call-by-value or call-by-referance?
What is the difference between a "message assignment" shape and an "expression" shape? : biztalk server
in case of broad band connector, where the data is being transferred thorugh OFC, during this course a light enery is created for carrying data, whether this light energy is created by broad band connect or it is created by virute of functions of the subscriber or not?
Explain the differences between analytical and computational modeling?
send me e-mail on dell tech question papers 2011 -2012