Ask the Experts
Ask the Experts
-
Network design for a small office
-
Who created the OSI model?
-
Overhead on a T1 carrier
-
Teleconferencing and videoconferencing
-
What's MD5 hash?
-
Performance metrics for network admin
-
Is Kerberos prone to Brute Force attack?
-
What are the advantages and disadvantages of IP telephony
-
Pros and cons of teleconferencing
-
Difference between hub and switch
-
What is a sub interface, PVC and loopback?
-
Protocols in the OSI model
-
Network layers explained
-
Best topology for LAN
-
Video conference through satellite
-
Basic networking definitions
-
What is the difference between a router and a gateway?
-
What is PPPoA and PPPoE?
-
Bigger than a bit but smaller than a byte
-
Conflict between LAN and WAN on home network
-
Difference between TCP/IP and OSI
-
What is a live machine?
-
Ping - next hop
-
Logical and physical network designs
-
Difference between how a router and a bridge function
-
Route the communication flow
-
Packets and frames
-
VPN connecting cuts off Internet
-
Configure modem and RAS
-
Static and dynamic routing
-
VPN over ATM
-
Features and benefits of the VLAN
-
Technologies used in teleconferencing and videoconferencing
-
How is router 'capacity' conventionally defined?
-
Difference between a payment switch and a router
-
Formula for determining the bandwidth attenuation through walls
-
CCNA and future prospects in networking
-
What is the basic concept of IP VPN?
-
Character oriented protocols and bit-oriented protocols
-
Use the AUX port to configure switches
-
Monitoring traffic by port number with MRTG
-
Switch terminology
-
Gateways vs. routers/bridges?
-
Ethernet packet collision over fiber optic?
-
CCNA expiration date?
-
Explaining concurrent tunnels
-
Multiplexing in OSI model?
-
ATM vs. leased line?
-
LAN design process?
-
Layer 2 switch saturation?
-
Voice over frame relay vs VoIP?
-
Protocols vs. network layers?
-
Firewall security risks
-
Blocking certain MAC addresses
-
Phone numbers and IP addresses
-
Which came first: TCP/IP or OSI?
-
Can two VPN clients coexist?
-
Advantages of 1800MHz GSM
-
Disabling open ports a good idea?
-
Workgroup vs. domain
-
Using H.323 with NAT
-
Setting up an Internet cafe
-
MCSE vs. CCNP
-
Advantages of DHCP and NAT
-
Why is ARP necessary?
-
NetBIOS name resolution problems
-
Mobile computing vs. wireless
-
Max distance for multimode fiber
-
Fiber vs. T1/T3 connections
-
Cisco switch code questions
-
The VoDSL and VoIP difference
-
The purpose of honeypots
Honeypots are primarily deployed to distract would-be attackers from the real servers. Using a honeypot may give you the opportunity to detect and respond to an attack (on the bogus system) before the attackers are able to do any real harm. Continue Reading
-
Blocking NT NetBios name queries
-
How many is too many collisions?
-
Protecting the LAN from lightning strikes
-
The V35 interface and its alternatives
-
IP source routing and security issues