Answer Posted / shailandra prakash trivedi
A firewall is a secure and trusted machine that sits between
a private network and a public network.
Access Control List is a list of permissions attached to an
object.The list specifies who or what is allowed to access
the object and what operations are allowed to be performed
on the object.
| Is This Answer Correct ? | 5 Yes | 3 No |
Post New Answer View All Answers
Contrast link state and distance vector routing protocols, giving an example of each.
When creating a static route, what is the gateway used to define?
Explain HDLC
Why transport layer protocols like TCP and UDP are called end-to-end protocols. What is the difference between them?
What does ‘data transparency’ mean ? With the help of a flow chart, explain the process of bit de-stuffing at the receiver’s end.
Give the equivalent binary word for the polynomial x8+x2+x+1.
Explain the following ARQ techniques in detail 1. Stop and wait ARQ 2. Selective repeat ARQ
When is a translating bridge used ?
Explain what is meant by the term ‘integrated service digital network’. Give three reasons a company might choose an ISDN link in preference to a leased line.
1. What ports does FTP traffic travel over? 2. What ports does mail traffic utilize? 3. What ports do HTTP and HTTPS use? 4. Why is NTP required in an NFS network? 5. Name some common mal software on the server side 6. What is CPAN? How do you access it? 7. What is PEAR? 8. What advantages does mod_perl have over a perl CGI? 9. What is required to do SSL in Apache 1.x? 10. What is Tcl? 11. What is a servlet engine/container? 12. What is BIND? 13. Name the steps to setup a slave zone in BIND 14. Name the steps to setup a primary zone in BIND 15. What commands would you use under Solaris or Linux to modify/view an LDAP tree?
Explain FDDI
If the transmitted code word is 10011000 and the received code word is 11001001. What is the error word ? Write transmitted code word , received code word and error word as polynomials.
Differentiate between Link state and Distance Vector Routing algorithm.
Explain Network Topologies and their uses.
The physical layer service is a non-confirmed service. Assume that some bits of data are lost during transmission over physical media, which layer will detect the loss and take some remedial measures. Explain any one method clearly depicting how this operation is performed.