How we put NIC in promiscuous mode when using MS windows,
can any one tell me in detail
Answer / jitendera sinha
it is very lenthy to explan
but
i try to expian
from ccontrol paneel
activate network bridging after instalation of nic card
vereyfi
in cmd mode
tyope
show netsh bridge
if that succesfull then
u have put the nic in premisious mode
| Is This Answer Correct ? | 2 Yes | 13 No |
What is required to support full-duplex Ethernet? A.) Multiple paths between multiple stations on a link B.) Automatic sensing operation by all connected stations C.) Loopback and collision detection disabled D.) Full-duplex NIC cards
Identify the command to configure DLCI 100 on an interface e0? A.) Router(config)# frame-relay local-dlci 100 B.) Router(config)# frame-relay local-dlci 100 int e0 C.) Router(config-if)# frame-relay local-dlci 100 D.) Router(config-if)# frame-relay local-dlci 100 int e0
Explain the term 'multicast'.
What is a back off on an 802.3 networks? A. It is latency in store and forward switching B. It is the time used for token passing from machine to machine C. It is the retransmission delay that is enforced when a collision occurs D. It is the result of two nodes transmitting at the same time. The frames from each transmitting device collide and are damaged
How do you find valid hosts in a subnet?
How often does IP RIP send out routing table updates by default? A.) They send complete updates every 30 seconds B.) They send partial updates every 30 seconds C.) They send complete updates every 60 seconds D.) They send partial updates every 60 seconds
hi shain can u send me some detail about bgp so that i can enhance my knowledge over bgp and can you also teach me about the process of suppernating. now what i am thinking that this could be last visit on that site overhere.so please mail that short of thing on my gmail id i am requesting to all of the visitor that please send theire doubt or question to my new gmail id which is jitendera.ccnainterview@gmail.com.i will try to solve it if i am capable to do it Wishing all of you for great future Jitendera kaumar sinha
Identify the purpose of the wildcard mask? A.) Match a certain portion of the IP address while ignoring the rest of the address B.) Determine the class of the IP address C.) Determine the network portion of an IP address D.) Hide the host portion of an IP address
1350 Value in which type of access-list?
What is the link state routing protocol in the TCP/IP protocol stack? A. IP B. IS-IS C. NLSP D. OSPF E. RIP version 2
Which of the following is not a characteristic of link-state routing protocols? ❍ A. VLSM support ❍ B. Route summarization at any bit level ❍ C. Full routing updates at regular intervals ❍ D. Discontiguous network support
The Network layer works with which of the following: A.) Globules B.) Bits C.) Packets D.) Segments E.) Frames