top of page

Category ✅
Search


Acess-List In Network Security
Packets are compared to the access lists sequentially until a match is found. If no match is found, the packet is discarded. Access lists filter content going through the router, not the traffic originated by the router. You should place standard IP access lists as close to the destination as possible, whereas extended IP access lists should be as close from the source as possible. You can only assign two access lists per interface, one in each direction. 1. Standard IP Acces
-
Jun 21, 20183 min read


LabCorp hit with federal suit over robocalls
Praesent sapien massa, convallis a pellentesque nec, egestas non nisi. Cras ultricies ligula sed magna dictum porta. Curabitur non nulla sit amet nisl tempus convallis quis ac lectus. Curabitur aliquet quam id dui posuere blandit. Vestibulum ac diam sit amet quam vehicula elementum sed sit amet dui. Vestibulum ac diam sit amet quam vehicula elementum sed sit amet dui. Pellentesque in ipsum id orci porta dapibus. Vivamus magna justo, lacinia eget consectetur sed, convallis at
-
Mar 30, 20181 min read
INTERVIEW QUESTION AND ANSWER
Windows Admin Interview Questions WINDOWS ADMIN INTERVIEW QUESTIONS 1. Describe how the DHCP lease is obtained . It’s a four-step process consisting of (a) IP request, (b) IP offer, (c) IP selection and (d) acknowledgement. 2. I can’t seem to access the Internet, don’t have any access to the corporate network and on ipconfig my address is 169.254.*.*. What happened? The 169.254.*.* netmask is assigned to Windows machines running 98/2000/XP if the DHCP server is not available.
-
Feb 7, 201724 min read
bottom of page