A Broadcast domain is a logical network segment in which the traffic is transmitted out to all the connected network devices, provided that the devices share the same subnet and are in the same VLAN.R...
Kumar Sudeep
Jun 30th, 2006
COLLISISON DOMAINA collision domain is a logical area in a computer netwerk where date packets can collied with one another , in particuler in the ethernet network protocol.BROADCAST DOMAINA broadcast...
Discretionary Access Control is a means to restrict access to objects based on the identity of subjects and/or groups to which the objects belong.Mandatory Access Control is a means to restrict access...
girish
Oct 27th, 2005
Das is used by itself according to it it is access and comtrolled while mas it has to be compulsory give the access controll.
The following are the routing protocols:- IS-IS runs over the data link layer- OSPF, IGRP, and EIGRP run directly over IP; OSPF and EIGRP have their own reliable transmission mechanism while IGRP assumed an unreliable transport- RIP runs over UDP- BGP runs over TCPThanks.
MD5 is a cryptographic hash function with a 128-bit hash value output. It is used to check the integrity of files/input. An MD5 hash is expressed as a 32-character hex number.It takes the variable-len...
tracert is a network tool used to determine the route taken by packets across the network.Tracert works by increasing the TTL value of each successive batch of packets sent. The first 3 packets have a...
See traceroute works using ICMP packets. First source sends an ICMP packet with Time to Live (TTL) field as 1 to the destination address. Now intermediate router receives the packet and sees that TTL ...
A rackmounting kit can be mounted in a rack and it comes with all accesories to mount in the rack. A stand alone unit cannot be mounted in rack. This would be placed on a desk.
We can implement the above situation if we have a global-nat statement configured on the firewall. This way, we would differentiate the security levels between inside and outside and would permit free...
RSA uses PKI that is correct - for authentication RSA is used int he form of X.509 Certificate.? Your answer of using Hash/Digital Signature is the answer if the question was "non-repudiation"
RSA is based upon public key/private key concept. For authentication one can encrypt the hash (MD5/SHA) of the data with his private key. This is known as digital signature. And secrecy is achieved b...
E1 Cercuit is used for long distance Calls / data transfer. E1 has 0-31 channels out of them 0 and 16 are used for signaling. IF E1 use for data transfer we can get bendwidth of 2MBPS or if for voice or voip 30 Chennalls. Dixit Bhavsar
HIwhen the server want to send some packect to diffrent Network .then they go to gatways(router) and after that Router check Routing table and send the packet to destination if address is present if not then discard
K.Shridhar
Mar 20th, 2006
Hi, When data goes through the server the first step is that it will check the gateway ip address means network main router IP if this will correct then the nexp porcess is done by router itselef...
digital signature : Information that is encrypted with an entity private key and is appended to a message to assure the recipient of the authenticity and integrity of the message. The digi...
Ans