⟩ Explain How do we do authentication with message digest(MD5)? (Usually MD is used for finding tampering of data)
The unique number will be generated by MD5, if it is tamped with someone, the value will be changed so you know you are tampered
The unique number will be generated by MD5, if it is tamped with someone, the value will be changed so you know you are tampered
What are unreasonable expectations for VPN?
What kind of policies and procedures need to be developed for VPN?
Can you list some items for a VPN checklist from deciding whether to use, then selecting, then deploying, then maintaining VPN?
What is Difference between the communication and transmission?
Explain What are the types of Transmission media?
Explain the difference between switch and Hub?
Explain What is SIP? how does it work? what are the alternatives if any? current and future practice and application standards?
What is region?
Explain What is wide-mouth frog?
Explain If you are given the IP address can u tell how many computers can be connected?What do you look at?