Networking Protocols (671)
Networking Administration (1008)
Networking Security (196)
Networking General (266)
Networking AllOther (430) A System programmer have access to computer room, it is possible that he may undertake some unauthorised activities at any time, due to his deep knowledge how can a control build to avoid the risk?
3 7258when a computer is restart,it will not show startup screen and instead a Beep sound is continuosly appearing,what could be the reason and there are important files and folders present in the system.what should be needed to do to bring the system to its normal state?
8 9445what is the name of the Jack used for Network Setup between one computer to Another and from computer to another device?
2 5011Is it possible for a User to change Admin Password who is not a part of Admin group if so how is it possible?
2 5221
A signal with 300 milliwatts power passes through 10 devices, each with an average noise of 3 microwatts. What is the SNR? What is the SNRdb?
Why do I need ftp?
Compare the contents of the NetSim routing table with those of a IP/RIP based router
Do you know what protocols fall under the tcp/ip internet layer?
What is early media? Explain the call flow.
Explain the difference between discretionary access control and mandatory access control?
What is ip set?
how to add additional instances sar r3, what are the steps to take server is down.
How will enable sound service in 2003?
What is AAR?
Do I need a dedicated ip?
What is an arp?
How do I check if a port is open on my mac?
What is Cross site scripting?
Differentiate between static and dynamic channel allocation.