What is spoofing?
a. Where a packets claims its source to be other that what its source really is.
b. Same as "denial of service" attacks
c. Where a machine continually pings another machine
d. Where certain broadcasts are passed through a router
Answer / indu
A
NOTE: There is protection built-in in IPv6 to against this.
| Is This Answer Correct ? | 0 Yes | 0 No |
STP is less susceptible to electrical ?
how many machines can access together SQL server in workgroup networking.??
CIDR stands for ? a. Carrier International Domain Routing b. Carrier Independent Domain Routing c. Classless Inter-Domain Routing d. Cross-platform Inter-Domain Routing
what is diffrance between NAT & PAT
how do u share printer through FTP(fire transfer protocol)?
Port is where upper layer protocols access which layer ? a. data-link b. network c. transport d. session
Bridges work at the Data Link Layer of the OSI model or more specifically what layer.
Which of the following are logged when IP access list logging is enabled? * source address * protocol * source port * destination address * access list number * destination port
You have divided your class C network into 6 subnets. Your subnet mask is 255.255.255.224. What are the ranges of IPs for your subnets ? Your Network address before subnetting was 200.252.144.0 a. 32-62, 64-93, 96-125, 128-157, 160-189, 192-221 b. 33-63, 65-94, 97-126, 129-158, 161-190, 193-222 c. 34-64, 66-95, 98-127, 130-159, 162-191, 194-223 d. 35-65, 67-96, 99-128, 131-160, 163-192, 195-224
whenever install patch cluster, system will be restart what is the problem?
What file identifies the name server (for information requests) if cold start file is to be consulted during the boot process .
suposse u r working in compny n they provide u an email id to get information , only u know ur id password , can ur boss hack or open ur email? without knowing password ?