Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Disha Srivastava

Bronze
Ask Disha Srivastava
51 Visits
0 Followers
0 Questions
Home/ Disha Srivastava/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: December 16, 2022In: Q & A

    Which Pdu Format Is Used When Bits Are Received From The Network?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 16, 2022 at 9:15 pm

    The Physical Layer Data Unit (PDU) format used when bits are received from the network is called a Frame. Frames contain the destination address, source address, and the data being transferred.

    The Physical Layer Data Unit (PDU) format used when bits are received from the network is called a Frame. Frames contain the destination address, source address, and the data being transferred.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: December 16, 2022In: Q & A

    How To Reverse Engineer Binary File?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 16, 2022 at 9:14 pm

    1. Disassemble the binary file into assembly code. This can be done using a disassembler such as IDA Pro, OllyDbg, or Ghidra. 2. Analyze the assembly code to understand the program’s logic. This can be done by manually reading the assembly code line by line or by using a decompiler to generate higheRead more

    1. Disassemble the binary file into assembly code. This can be done using a disassembler such as IDA Pro, OllyDbg, or Ghidra.

    2. Analyze the assembly code to understand the program’s logic. This can be done by manually reading the assembly code line by line or by using a decompiler to generate higher-level code.

    3. Identify data structures and functions. This can be done by analyzing the code and looking for patterns or by using tools such as BinDiff or Radare2.

    4. Reverse engineer the data structures and functions. This involves understanding the purpose of each data structure and function, and then writing code that does the same thing.

    5. Test and debug the reverse-engineered program. This can be done by running the program in a debugger and verifying that the program behaves as expected.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: December 16, 2022In: Q & A

    What Is The Difference Between Phishing And Pharming?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 16, 2022 at 9:13 pm

    Phishing is an attempt to acquire sensitive information such as usernames, passwords, and credit card details by pretending to be a trustworthy entity in an electronic communication. It typically involves sending an email asking the user to click a malicious link or enter sensitive information. PharRead more

    Phishing is an attempt to acquire sensitive information such as usernames, passwords, and credit card details by pretending to be a trustworthy entity in an electronic communication. It typically involves sending an email asking the user to click a malicious link or enter sensitive information.

    Pharming is a malicious attack that redirects a user from a legitimate website to a malicious one without their knowledge, often for the purpose of stealing sensitive information. It is a more advanced form of phishing, as it does not require any interaction from the user.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: December 16, 2022In: Q & A

    How To Check Latency And Packet Loss?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 16, 2022 at 9:12 pm

    To check latency and packet loss, you can use a network monitoring tool like PingPlotter or Traceroute. With these tools, you can send out a ping and see the response time, as well as any lost packets. This information can be used to identify latency and packet loss problems in your network. AdditioRead more

    To check latency and packet loss, you can use a network monitoring tool like PingPlotter or Traceroute. With these tools, you can send out a ping and see the response time, as well as any lost packets. This information can be used to identify latency and packet loss problems in your network. Additionally, you can use a service like Speedtest to measure your internet connection speed, which can also help you identify potential latency and packet loss issues.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: December 16, 2022In: Q & A

    How To Connect Api To Database?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 16, 2022 at 9:11 pm

    1. Create a database for your API. 2. Create a web server to host the API. 3. Create a connection between the database and the web server. 4. Create an API endpoint to read and write data from the database. 5. Create coding logic to interact with the API endpoint. 6. Test the API to ensure data is bRead more

    1. Create a database for your API.
    2. Create a web server to host the API.
    3. Create a connection between the database and the web server.
    4. Create an API endpoint to read and write data from the database.
    5. Create coding logic to interact with the API endpoint.
    6. Test the API to ensure data is being read and written correctly.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: December 16, 2022In: Q & A

    What Are Two Characteristics Of Multicast Transmission?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 16, 2022 at 9:10 pm

    1. Multicast transmissions are one-to-many transmissions, allowing a single packet to be broadcast to multiple recipients. 2. Multicast transmissions are designed to be efficient, using minimal network resources and bandwidth.

    1. Multicast transmissions are one-to-many transmissions, allowing a single packet to be broadcast to multiple recipients.
    2. Multicast transmissions are designed to be efficient, using minimal network resources and bandwidth.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: December 16, 2022In: Q & A

    What Do Rfc 349 And Rfc 1700?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 16, 2022 at 9:09 pm

    RFC 349 and RFC 1700 are both Request for Comment (RFC) documents published by the Internet Engineering Task Force (IETF). RFC 349 is a document that describes the Telnet protocol, while RFC 1700 is a document that describes the official Assigned Numbers used in Internet protocols.

    RFC 349 and RFC 1700 are both Request for Comment (RFC) documents published by the Internet Engineering Task Force (IETF). RFC 349 is a document that describes the Telnet protocol, while RFC 1700 is a document that describes the official Assigned Numbers used in Internet protocols.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: December 16, 2022In: Q & A

    How To Add User To Different Groups In Linux?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 16, 2022 at 9:07 pm

    1. To add a user to a group, use the usermod command. This command has the syntax: usermod -aG groupname username 2. To view the existing groups available on the system, use the getent command. This command has the syntax: getent group 3. To add a user to multiple groups, use the usermod command witRead more

    1. To add a user to a group, use the usermod command. This command has the syntax:

    usermod -aG groupname username

    2. To view the existing groups available on the system, use the getent command. This command has the syntax:

    getent group

    3. To add a user to multiple groups, use the usermod command with the -G option. This command has the syntax:

    usermod -G group_1,group_2,group_3 username

    4. To add a user to a new group, use the groupadd command. This command has the syntax:

    groupadd groupname

    5. To delete a user from a group, use the gpasswd command. This command has the syntax:

    gpasswd -d username groupname

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: December 16, 2022In: Q & A

    Which Two Statements Are True About Ntp Servers In An Enterprise Network?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 16, 2022 at 9:06 pm

    1. NTP servers should be configured to synchronize with an external time source. 2. NTP servers should be configured to provide time services for the internal network.

    1. NTP servers should be configured to synchronize with an external time source.
    2. NTP servers should be configured to provide time services for the internal network.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: December 16, 2022In: Q & A

    How Do I Know If I Have Ransomware?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 16, 2022 at 9:05 pm

    If you suspect that your computer may have ransomware, there are a few ways to check. First, you should scan your computer with an antivirus or anti-malware program. This will detect any malicious software that may be on your system. If the scan finds any suspicious files, you should research them tRead more

    If you suspect that your computer may have ransomware, there are a few ways to check. First, you should scan your computer with an antivirus or anti-malware program. This will detect any malicious software that may be on your system. If the scan finds any suspicious files, you should research them to see if they are associated with ransomware. Additionally, you should check for any strange behavior from your computer, such as slow performance, unexpected pop-ups, or strange messages. Finally, if you notice that any of your files have been encrypted or locked, this is a sure sign that you have ransomware.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 30 31 32 33 34 … 52

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • Farwa Khalid

    What Is A Typical Symptom Of A CMOS Battery Failure?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Communities
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut