Answer Posted / abdulkader
no,
| Is This Answer Correct ? | 6 Yes | 2 No |
Post New Answer View All Answers
If you need to encrypt and compress data for transmission, how would you achieve it?
What is the difference between routable and non- routable protocols
What are the types of phishing attacks?
Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?
What is the general data protection regulation (gdpr)?
What is trojan virus?
What is udp flood?
What is remote access vpn?
Describe a TCP connection sequence
What is terminal emulation, in which layer it comes
What is frame relay, in which layer it comes
What is ransomware?
What are the possible ways of data exchange
What is intrusion prevention systems (ips)?
Explain what is difference between arp & rarp? How both of these protocols will work, and where it will use?