Ask the Experts
Ask the Experts
-
Conflict between LAN and WAN on home network
-
Difference between TCP/IP and OSI
-
What is a live machine?
-
Ping - next hop
-
Logical and physical network designs
-
Difference between how a router and a bridge function
-
Packets and frames
-
VPN connecting cuts off Internet
-
Configure modem and RAS
-
Static and dynamic routing
-
VPN over ATM
-
Features and benefits of the VLAN
-
Technologies used in teleconferencing and videoconferencing
-
How is router 'capacity' conventionally defined?
-
Difference between a payment switch and a router
-
Formula for determining the bandwidth attenuation through walls
-
What is the basic concept of IP VPN?
-
Character oriented protocols and bit-oriented protocols
-
Use the AUX port to configure switches
-
Monitoring traffic by port number with MRTG
-
Switch terminology
-
Gateways vs. routers/bridges?
-
Ethernet packet collision over fiber optic?
-
CCNA expiration date?
-
Explaining concurrent tunnels
-
Multiplexing in OSI model?
-
ATM vs. leased line?
-
LAN design process?
-
Layer 2 switch saturation?
-
Voice over frame relay vs VoIP?
-
Protocols vs. network layers?
-
Firewall security risks
-
Blocking certain MAC addresses
-
Phone numbers and IP addresses
-
Which came first: TCP/IP or OSI?
-
Can two VPN clients coexist?
-
Advantages of 1800MHz GSM
-
Disabling open ports a good idea?
-
Using H.323 with NAT
-
Setting up an Internet cafe
-
MCSE vs. CCNP
-
Advantages of DHCP and NAT
-
Why is ARP necessary?
-
NetBIOS name resolution problems
-
Mobile computing vs. wireless
-
Max distance for multimode fiber
-
Fiber vs. T1/T3 connections
-
Cisco switch code questions
-
The VoDSL and VoIP difference
-
The purpose of honeypots
Honeypots are primarily deployed to distract would-be attackers from the real servers. Using a honeypot may give you the opportunity to detect and respond to an attack (on the bogus system) before the attackers are able to do any real harm. Continue Reading
-
Blocking NT NetBios name queries
-
How many is too many collisions?
-
Protecting the LAN from lightning strikes
-
The V35 interface and its alternatives
-
IP source routing and security issues