How we ping ICMP a NIC with a correct IP address but with wrong MAC address Do all NIC's can run inpromiscuous mode
3 6793as we know that isdn bri port come with either a u interface or some thing s/t interface what is the diffrenmce between them
2 3854Request any body to explain the parameters of Ipsec vpn tunnel while creating a tunnel in Cisco ASA.
3 5220from last ten days i watched that no any new questions are placed in ccna catogarey.so plz place the questions it is very use full to beginers like us
2 3557In transport layer, for connection oriented communication Three way handshake process is there to establish a connection. So question is that, when a host send an ACK messages to another host with host intend to establish a connection, the source host send it as Broadcast or unicast message? Cud anyone explain this. Thanks in advance.
3 6594Hi Jitendera, Wat do u do..?? I mean r u working anywhere???? Basically where r u from??? If u don't hv any problem, u can say..?? Or else mail me mr.shahin07@gmail.com
2184what is leased line and if any issue occur what will u do thai is trouble shootin occurs let leased line is down
1 9038Post New HCL CCNA Interview Questions
How can you create anonymous subroutines?
What is the recommended planning sequence, in co? : co- cost center accounting
What is the use of mysql_fetch_array () function in php?
Is unix multiuser?
What type of design skills do you have?
Write a query to create a duplicate table with and without data present?
What is the purpose of using blocks ?
Give the syntax to start the server?
What is the use of @controller in spring?
What is worker node in Apache Spark cluster?
Have you ever used the SAS Debugger?
How do you play a audio using html5?
What is the difference between “visibility:hidden” and “display:none”?
What factors you will consider calculating the storage requirement for that view?
Explain about manipulating the recordset object