what is a malicious router?when it occurs?
what is a malicious pacekt ?when it occurs?
Answer / vinod
malicious pacekt is packet send by any Hacker or attacker
which is not noemal. Eg a TCP Normal packet contains its
header with sync, flag, or Ack. source and dest, port so any
packet which states that it is TCP but nt as per standared
TCP format is call malicious pacekt.
Is This Answer Correct ? | 1 Yes | 1 No |
When would you use ISDN? A.) To connect LANs using POTS B.) To support applications requiring voice, data, and video C.) When you need a consistent and very high rate of data speed D.) To connect to IBM mainframes
Identify the command to display the status of the Frame Relay virtual circuit? A.) Router# show frame-relay virtual-circuit B.) Router(config)# show frame-relay pvc C.) Router# show frame-relay pvc D.) Router# show virtual
WHAT IS SERIAL TRANSMISSIONS,PARALLELL TRANSMISSION
Which command displays the IP addresses assigned to specific host names? A. show hosts B. show interface C. ping host name D. config host name E. show host mapping F. show host ip address G. trace ip addresses host name H. a partridge in a pear tree
Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address
HI friends. i need a suggestion and looking towards you foryours valuable suggestion friends i have completed ccna now i want to done red het linux system admnistration and networking i am liitle bit confuse betwwen them which one is better for me for job point of view reply soon waiting for your reply
what are the different asymmetric algorithms?
The two sublayers of the IEEE Data Link Layer are which of the following? A.) Link and Logical Control B.) Data Link and LLC C.) Logical Link Control and Media Access Control D.) Data Link and MAC
Significance of IP helper-address Command on SW? Is it necessary to put this command?
What type of frame does CDP use to gather information about it's neighbors? A.) TCP/IP B.) Novell-ether C.) Subnetwork Access Protocol (SNAP) D.) Ethernet_II
Which two statements are true? (Choose two) A. Ethernet 802.3 utilizes a half duplex method for data transfer B. In a 100 MBS point to point connection a full duplex connection can provide 400 Mbs of data transfer C. Ethernet switches can use the full duplex mode to connect multiple nodes on a single pod of a switch D. Full duplex Ethernet takes advantage of UTP using one pair for transmission and the other pair for reception
what is the difference between a ‘half-duplex’ and a ‘full-duplex’ system?