How do cryptography-based keys ensure the validity of data
transferred across the network?
Answer / deniaxis
Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.
| Is This Answer Correct ? | 7 Yes | 0 No |
What is the benefit of Active Directory ?
CSMA/Cd protocol used in
Explain Difference between congestion control and QoS(or Quality of service)
How To stop USB drives useing of group policy
Draw the IP datagram header format. “IP datagram has a checksum field still it is called an unreliable protocol”. Justify?
client server is working in asyn mode then how communication will take place bt client and server.
What is the Bandwidth of ethernet ?
Explain CSMA/CD
Enumerate the main responsibilities of data link layer ?
what is buffering and flooding in NIC ?
1).what is forest? 2).what is dns and dhcp port no's? 3).what is file system? 4).what is terminal server?
What are the various classes of IP addressing? Calculate the maximum number of class A, B and C network Ids.