answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

Distribute between cut through and store and forward switch?

In cut through switch received data is directly forwarded to the destination & in the store and forward switch received data is stored in the switch for future use and then forwarded to the destination.

How do you fix error 138 net err network access denied unable to access the network on Google Chrome?

An error 138 network error - access denied error on Google Chrome indicates that the computer is unable to access the internet. The first thing to check is that either the Ethernet cable is plugged into the computer or the Wi-Fi connection is turned on and able to access the internet. If this has been checked and is working it could be a Windows or third party firewall issue, which can be fixed by allowing access to Google Chrome in the firewalls 'allowed programs' area. Once access has been given the computer may need to be restarted to allow full access.

What is difference between Prime Security Collateral Security?

Prime security is the one which is funded by banks for raw material, power, finished goods etc are taken by bank as prime security.

The collateral security, which is non-funded by banks. But in turn the borrower keep it as security with bank. Such as any mortgage, Fixed asset etc

Can someone hack into your computer using Teamviewer?

No sir, if you have it running in the back ground than maybe, but i doubt they will get your password, it regenerates every time you restart your TV and if they get it wrong i believe you get a warning so you can generate a new one or shut it down fast :Pso yeahh NO :D

If you have decided to establish a VoIP system in your home what devices is necessary to connect your VoIP sever?

You need a VoIP modem or a computer to connect your phone and accessed your VoIP Server. Aditionally you also require an ATA adapter.

What is network different kind of network?

  • LAN - Local Area Network
  • WLAN - Wireless Local Area Network
  • WAN - Wide Area Network
  • MAN - Metropolitan Area Network
  • SAN - Storage Area Network, System Area Network, Server Area Network, or

sometimes Small Area Network

  • CAN - Campus Area Network, Controller Area Network, or sometimes Cluster Area

Network.

  • PAN - Personal Area Network
  • DAN - Desk Area Network

( VIKRAM SINGH )

How can you reduce the risks in access control?

Good question - access control must be carefully audited, before and after implementation. You don't want to give someone too much access if their job or position does not require it, and too little for others so that they can't do their job appropriately.

What is the most common key length for PKI components?

Key lengths can be variable, but in general one should use a key length of 8 characters or more, or some key that can be at least 128 bits in length, or greater. Depending on the PKI technique used the key could vary anywhere from 128 bits to 2048 or more.

What does IDF stand for?

IDF has many meanings, here are the most common.

Intel Developer Forum

ÃŽle-de-France (region)

Israel Defence Force

International Diabetes Federation

Compare the TCP header and the UDP header?

Both TCP and UDP have origin and destination ports - and that is about all the similarity there is between the two. TCP has several other fields that UDP doesn't have, including window size; a consecutive byte numbering (to figure out where to place a TCP segment in a data stream); the bytes that the other side is expected to send; and others.

How many svchost exe processes are supposed to be running?

Depends on your system. SVChost processes are used for various system services, so there might be at least several. You should not worry too much as long as all svchost processes are launched from windows install subdyrectory system32

Explain the connection oriented connection less services using bind connect listen accept system calls?

Connectionless Service

In a connectionless service, the packets are sent from one party to another with no need for connection establishment or connection release. The packets are not numbered; they may be delayed, lost, or arrive out of sequence.

Connection-Oriented Services

In a connection-oriented service, a connection is first established between the sender and the receiver. Data are transferred. At the end, the connection is released.

Connection Establishment Connection establishment involves the following:

Host A sends a packet to announce its wish for connection and includes its initialization information about traffic from A to B.

Host B sends a packet to acknowledge (confirm) the request of A.

Host B sends a packet that includes its initialization information about traffic from B to A.

Host A sends a packet to acknowledge (confirm) the request of B.

This connection establishment implies the steps i.e. bind, connect, listen & accept