Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What LAN analyzer tools are you familiar with and describe
how you use them to troubleshoot and on what media and
network types.

Answers were Sorted based on User's Feedback



What LAN analyzer tools are you familiar with and describe how you use them to troubleshoot and on..

Answer / pankaj

Ethereal: is a free packet analyzer computer application. It
is used for network troubleshooting, analysis, software and
communications protocol development, and education. Now it
is named as Wirshark

Lanwatch

Is This Answer Correct ?    13 Yes 0 No

What LAN analyzer tools are you familiar with and describe how you use them to troubleshoot and on..

Answer / sanjay

Wireshark

Is This Answer Correct ?    4 Yes 3 No

Post New Answer

More Networking Administration Interview Questions

2 command you can use to see which directories have been shared out by server machine1?

1 Answers  


in vcs, which network[private or public] channel bandwidth is high?

0 Answers  


System used to deliver mail between domains running different mail protocols is called ?

1 Answers  


2 examples of a packet-switched network. a. public telephone network b. ethernet network c. token-ring network d. ATM network

1 Answers  


Which subdirectory of /usr/lib/mail contains the configuration files for sendmail ?

1 Answers  


You have just added a new interface to your Solaris Machine. Which command would you run to confirm that the new interface has been configured?

1 Answers  


When several protocols work together, they form a protocol called as

1 Answers  


What is the importance of authentication?

0 Answers  


Define mac addresses?

0 Answers  


Name 3 commands will let you logon to another machine ?

1 Answers  


The following are the steps toward encapsulation. Put them in order: 1. User input 2. data 3. frame 4. segment 5. datagram 6. bits a. 1-4-2-5-3-6 b. 1-5-4-2-3-6 c. 1-2-3-5-4-6 d. 1-2-4-5-3-6

1 Answers  


Choose three reasons why the networking industry uses a layered model: * It facilitates systematic troubleshooting * It allows changes in one layer to occur without changing other layers * It allows changes to occur in all layers when changing one protocol * It clarifies how to do it rather than what general function to be done * It clarifies what general function is to be done rather than how to do it

2 Answers   Cisco, Infitec,


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)