Please list the types of Firewalls, Routers, Switches,
Servers, you manage?
Answer / ravin vasani
Hello,
Firewall
There are four types of Firewall:-
1. Application-level Firewalls
2. Network-Level Firewalls
3. Circuit-Level Firewalls
4. Stateful Multi-level Firewalls
Router
There are three types of router:-
1. Access layer router:- Which is used for Small offices and
corporates.
2. Distribution layer router:- Which is used for ISP's like
sift tata.
3 Core layer router:- Which is used for Backbone ISP's like
vsnl.
Switches
There are four types of Switches:-
1. Unmanageable Switches
2. Manageable Switches
3. Smart (or intelligent) Switches
4. Enterprise Managed (or fully managed) switches
Servers
1. Hosting Server
1. Shared Server
2. Virtual Server
2. Managed Dedicated Server
1. Cluster/Grid
2. Cloud
3. Application Server
1. Web Servers
2. Application Servers
3. Specialized Servers: File, Printer and Database Servers
4. Media Servers
5. Mail (Exchange) Servers
6. Trends in Server Type Configuration and Performance
7. Green and Energy Efficient Servers
8. Blade Servers
9. Mobile Rack Servers
10. Efficient Cloud Servers
Is This Answer Correct ? | 20 Yes | 3 No |
Define rsa algorithm?
3 types of mail access supported by IMAP4 are:
Your Ultra 1 has a 100Mbps Fast Ethernet Card. What is the name of the interface ?
Which set has protocols of ONLY the Network layer ? a. IP, UDP, TCP, RARP, ICMP b. IP, UDP, ARP, RARP, ICMP c. SPX, UDP, GNS, ARP, APPLETALK d. IPX, FTP, ARP, RARP, ICMP
True/Flase: Relative domain name (RDN) ends with the dot.
How does the MAC sublayer assure that nothing was damaged in transit? a. CRC b. it can't c. ackwoledgement
Define nat?
What agent acts as an interface between the user and mail transfer agent.
How we configure Multipal Name Hosting (DNS) with Single WAN IP or Live IP?
Which layer is responsible for determining if sufficient resources for the intended communication exists? * Application * Network * Session * Presentation * Transport
13 Answers Cisco, Inflow Technologies, Infotech,
Which of the following methods are used as flow control ? Choose 3 a. Acknowledgements b. Windowing c. Traceroute d. TTL e. Sliding windows
Is there any website? Which can theft or watch any system or computer hardware drives(memory)while they are accessing Internet.If it is avilable what is it? Please answer me.Advance thanks