what is a malicious router?when it occurs?
what is a malicious pacekt ?when it occurs?



what is a malicious router?when it occurs? what is a malicious pacekt ?when it occurs? ..

Answer / vinod

malicious pacekt is packet send by any Hacker or attacker
which is not noemal. Eg a TCP Normal packet contains its
header with sync, flag, or Ack. source and dest, port so any
packet which states that it is TCP but nt as per standared
TCP format is call malicious pacekt.

Is This Answer Correct ?    1 Yes 1 No

Post New Answer

More CCNA Interview Questions

When would you use ISDN? A.) To connect LANs using POTS B.) To support applications requiring voice, data, and video C.) When you need a consistent and very high rate of data speed D.) To connect to IBM mainframes

2 Answers  


Identify the command to display the status of the Frame Relay virtual circuit? A.) Router# show frame-relay virtual-circuit B.) Router(config)# show frame-relay pvc C.) Router# show frame-relay pvc D.) Router# show virtual

1 Answers  


WHAT IS SERIAL TRANSMISSIONS,PARALLELL TRANSMISSION

2 Answers   ASD Lab,


Which command displays the IP addresses assigned to specific host names? A. show hosts B. show interface C. ping host name D. config host name E. show host mapping F. show host ip address G. trace ip addresses host name H. a partridge in a pear tree

2 Answers  


Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address

1 Answers  






HI friends. i need a suggestion and looking towards you foryours valuable suggestion friends i have completed ccna now i want to done red het linux system admnistration and networking i am liitle bit confuse betwwen them which one is better for me for job point of view reply soon waiting for your reply

1 Answers  


what are the different asymmetric algorithms?

0 Answers   CCIE,


The two sublayers of the IEEE Data Link Layer are which of the following? A.) Link and Logical Control B.) Data Link and LLC C.) Logical Link Control and Media Access Control D.) Data Link and MAC

3 Answers  


Significance of IP helper-address Command on SW? Is it necessary to put this command?

1 Answers   Accenture,


What type of frame does CDP use to gather information about it's neighbors? A.) TCP/IP B.) Novell-ether C.) Subnetwork Access Protocol (SNAP) D.) Ethernet_II

1 Answers  


Which two statements are true? (Choose two) A. Ethernet 802.3 utilizes a half duplex method for data transfer B. In a 100 MBS point to point connection a full duplex connection can provide 400 Mbs of data transfer C. Ethernet switches can use the full duplex mode to connect multiple nodes on a single pod of a switch D. Full duplex Ethernet takes advantage of UTP using one pair for transmission and the other pair for reception

1 Answers  


what is the difference between a ‘half-duplex’ and a ‘full-duplex’ system?

0 Answers  


Categories