Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Maryam Khalid

Bronze
Ask Maryam Khalid
60 Visits
0 Followers
0 Questions
Home/ Maryam Khalid/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: February 3, 2022In: Q & A

    When Creating Network Diagrams, What Icon Description Typically Represents A Network Firewall?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on March 15, 2022 at 1:13 pm

    When creating network diagrams, what icon description typically represents a network firewall? A rectangle icon whose four arrows point in the opposite direction. The icon resembles the brick wall. A rectangular shape article that has a squiggly line on the front. A hockey-puck shape with two arrowsRead more

    When creating network diagrams, what icon description typically represents a network firewall?

    • A rectangle icon whose four arrows point in the opposite direction.
    • The icon resembles the brick wall.
    • A rectangular shape article that has a squiggly line on the front.
    • A hockey-puck shape with two arrows on the inner side and two arrows on the outer side.

    Answer:  When you create the network diagram, the icon which resembles the brick wall is the one that represents the network firewalls.

    The network diagrams in the description of the computer and the network, basically it is the visual structure.it can represent the components of the network their interaction, involving the routers, hubs, firewalls.

    Moreover, based on its scope and goal it has a broad level of details and also gives a broader perspective. For example, the local area network represents the individual IP address while the MAN network diagram shows the IP addresses of the buildings or the whole area with a single node. The network diagram has two types such as:

    • Logical network diagram
    • Physical network diagram.

    Logical network diagram:

    It shows the methods of how the data is moving over a network. That’s why the logical diagram represents the subnets (VLAN IDs, masks, and addresses), the devices as the router, firewalls, and the protocols of routing. The logic is related to layer 3 in the OSI model, which is known as the network layer.

    Physical network diagram:

    It can represent the physical organization of the components that can form the network, it includes the cables and the hardware. simply, it can show the bird’s eye view of the network.

    The network diagram is used for different purposes and some of them are listed

    in the following:

    • It is used to make a plan of the network.
    • It can update the existing network.
    • It can also use to troubleshoot the problem.
    • It can keep the components records/tracks.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: February 3, 2022In: Q & A

    Which Of The Following Protocols Is Used For Resolving Host Names To Ip Addresses?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on March 15, 2022 at 1:13 pm

    Which Of the Following Protocols Is Used for Resolving Host Names to Ip Addresses? FTP HTTP DNS DHCP. Answer: The protocol which is used to resolve the hostnames to IP addresses is the DNS (Domain Name System). It is the technique that generally resolves the names of the server to the address of theRead more

    Which Of the Following Protocols Is Used for Resolving Host Names to Ip Addresses?

    • FTP
    • HTTP
    • DNS
    • DHCP.

    Answer: The protocol which is used to resolve the hostnames to IP addresses is the DNS (Domain Name System). It is the technique that generally resolves the names of the server to the address of the network. DNS allows the local administrator to control the records which covert the name to the IP addresses.

    What do you know about DNA?

    DNS (Domain Name System) is the database where the domains are identified and transformed to IP addresses. The DNS can map the names which are used to find the specific website to the network addresses which is used by the system to identify the site. For instance, if the user searches “xyz.com” in the browser the server on the backend maps the typed domain name to its corresponding IP address. The IP address structure is like 206.0.123.71.

    The web browser and different network activities depend on the Domain Name System to give the necessary data which is used to connect the user with the hosts. The mapping of the Domain Name System is spread over all the networks in the form of an authoritarian hierarchy. The organizations, schools’ universities, the government all of them have specific IP addresses ranges and domain names. Many URLs are formed around the domain name of the server which can handle the client request. The working of the DNS is in the following:

    • Enter the web address.
    • The message is sent by the browser known as recursive DNS query to the network which checks the IP address associated with the domain.
    • The query is sent to a recursive DNS server which is handled by the ISP, if the address is present then it will return toward the user and the webpage loads.
    • If the recursive server has no answer then DNS will query some other services in the order of DNS root name server, top-level domain name server, and authoritative name server.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: February 3, 2022In: Q & A

    Which Of The Following Threats Would Be Classified As The Actions Of A Hactivist?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on March 15, 2022 at 1:13 pm

    Which of the following threats would be classified as the actions of a hacktivist? Environmental threat. Internal threat. External threat. Compliance threat. Answer: External threat is the one that is classified as the action of a hacktivist. It is the process of hacking the system to convey the mesRead more

    Which of the following threats would be classified as the actions of a hacktivist?

    • Environmental threat.
    • Internal threat.
    • External threat.
    • Compliance threat.

    Answer: External threat is the one that is classified as the action of a hacktivist. It is the process of hacking the system to convey the message whether it is social or political.

    Hacktivist is the one who can perform the process of hacktivism.it the work in which the website or the system is hacked to carry the political message. as compared to other hackers who can hack to harm someone by confiscating their personal information and demand ransom, the hacktivist is also involved in the activities which are used to highlight political issues, cause, etc.

    Hacktivism is the method to carry the activity of civil disobedience, the activities which are involved in it are DOS, redirections, virtual sabotage, etc. The hacktivist is determined to destroy the control of the government and the suppression of the electronic and technology related to web content. Hacktivists oppose the copyright rules and regulations and also want to avoid the restriction on electronic data.

    Different type of hacktivism is present which are listed in the following section:

    Doxing:

    In this type, the hacktivist collects the specific person or company’s sensitive information and reveals it to the public. 

    Blogging anonymously:

    This is the type which is useful for the journalist, whistleblowers, who want to bring the specific problem by keeping the privacy.

    DOS:

    This is the method in which the specific system is flooded to keep the users from accessing it.

    Leakage of the information:

    In it, the inside person of the company who has access to the private information is revealed to the public.

    Website replication:

    It is used to replicate the website with the help of the different URLs to dodge the control ship rules.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: February 3, 2022In: Q & A

    Which Of The Following Is Not A Task That A Vpn Concentrator Is Responsible For?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on March 15, 2022 at 1:13 pm

    Which of the following is NOT a task that a VPN concentrator is responsible for? Answer: VPN connector is responsible to shut the connection which is established along with the malevolent traffic that happens. VPN is the network device type that provides the formation of the secure VPN connection anRead more

    Which of the following is NOT a task that a VPN concentrator is responsible for?

    Answer: VPN connector is responsible to shut the connection which is established along with the malevolent traffic that happens.

    VPN is the network device type that provides the formation of the secure VPN connection and also the secure message delivery in the VPN nodes.it is responsible to connect various remote devices with a central corporate network.it is used to secure remote devices and client communication like the tabs, IoT, mobile phones, etc. it might be acting as the extension of the network security. A router type is built to form and maintain the infrastructure of the communication system.

    The connector act by adding the features to a VPN router along with the new technical data and the security features of the communications.it can form and control the VPN tunnel quantity. The connector can also create the VPN architecture. Some of the functions are:

    • Initiation and design of the tunnels.it can also able to create multiple VPN tunnels.
    • Users’ authentication.
    • Users are assigned IP addresses with the help of a VPN connector.
    • Data encryption and decryption.
    • Data end-to-end delivery.

    If you want to run a large business than a VPN connector then consider the VPN connector but the maintenance cost is very high. For a small business, the VPN router is enough because it is budget-friendly and easy to control. For the larger connection, the router is not good that’s why the connector is sufficient.do not mix the connector with the site-to-site VPN services, it is the developed secure connection of the fix places, which are allowed to access the same database and the internal system.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: February 3, 2022In: Q & A

    What Would Be A Reason For Using A Workstation Rather Than A Personal Computer?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on March 15, 2022 at 1:13 pm

    What would be a reason for using a workstation rather than a personal computer? Answer: The mainframe is considered as the workstations. The reason to use the workstations is when you are in need to have powerful computational abilities, cloud computing, the flexibility, which is related to the capaRead more

    What would be a reason for using a workstation rather than a personal computer?

    Answer: The mainframe is considered as the workstations. The reason to use the workstations is when you are in need to have powerful computational abilities, cloud computing, the flexibility, which is related to the capability of the resource to be modified and meet the requirements or need.

    The workstations are computer systems but they have the high capability which is built for an individual along with new technology graphics abilities, high storage, and a strong CPU (central processing unit).it has greater capability than the PC but as compared to the server it is less in advancement. Workstations are also referred to as the dumb terminal, which means with no processing capability and only connected to the mainframe systems.

    The raw power permits the high-capacity workstations to have a great resolution or 3D graphics, multitasking software, and the newest ability to connect with another computer. The function of the workstations is to perform scientific and engineering work.in complicated and business applications it is important. The high-resolution workstations mostly work the attached network “client” PCs which can use the different tools and apps to have the permission and modify the workstations data which is stored in it.

    The main difference between the PC and the workstation is that it has advanced graphics and processing ability. But the high-end PC with advanced technology is very difficult to distinguish from the low workstations. Some of the features of the workstation are listed in the following sections:

    • EEC and memory assistance.
    • For the registered module the extra space for the memory.
    • Multiple screen/display.
    • The efficient central processing unit has multiple processor spaces.
    • Along with advanced capability, it has a reliable operating system (OS).
    • Advanced graphics interface with efficiency.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: February 3, 2022In: Q & A

    Which Of The Following Is A Common Layer 2 Protocol That Could Run Over A Dedicated Leased Line?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on March 15, 2022 at 1:13 pm

    Which of the following is a common Layer 2 protocol that could run over a dedicated leased line? Answer: Point-to-Point Protocol (PPP) is the common Layer 2 protocol that can operate over a dedicated leased line. The communication channel whose work is to interconnect more than two sites is known asRead more

    Which of the following is a common Layer 2 protocol that could run over a dedicated leased line?

    Answer: Point-to-Point Protocol (PPP) is the common Layer 2 protocol that can operate over a dedicated leased line.

    The communication channel whose work is to interconnect more than two sites is known as the leased line and it is dedicated. It is the private circuit at more than two places according to the commercial contract, Between the client and the provider, it is the service agreement. as it is dedicated that’s why the data transfer continuously from one point to the other with a fixed speed and charge every month. Internet, telephones service uses the leased lines and the communication medium is the fiber optics cable for the greater speed and the bandwidth.

    It is not entirely the dedicated channels or physical connection, a reserved circuit of the two open points. As compared to the telephone services which do not use the same circuit in a switching. A large organization that required fast speed uses the leased line for the connection of more than one site. as they are used by the large communication companies which means it is quite expensive, and the alternate of this is the publics’ telephone or networks instead to use the security protocols and install and control the costly private lines. The dedicated leased line characteristics are discussed in the following:

    • It can interconnect two sites and the connection is established connection with the service provider’s facility or CO (telephone company control office).
    • It is more costly than the WAN technology that provides the same data rates but in the dedicated line, the network is the private client does not have to share the bandwidth with others.
    • The layer 2 protocol of the dedicated leased line is PPP (Point-to-point protocol).
    • The dedicated leased line is commonly found in North America.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: February 3, 2022In: Q & A

    Which Ieee Standard Determines How Vlans Work On A Network?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on March 15, 2022 at 1:13 pm

    Which IEEE standard determines how VLANs work on a network? 802.12. 802.2x. 802.1Q. 802.3ae. Answer: The working of the VLAN on the network is defined by the IEEE 802.1Q standard. Virtual private network as the name suggested is the logical network which is common due to the network complexity and sRead more

    Which IEEE standard determines how VLANs work on a network?

    • 802.12.
    • 802.2x.
    • 802.1Q.
    • 802.3ae.

    Answer: The working of the VLAN on the network is defined by the IEEE 802.1Q standard.

    Virtual private network as the name suggested is the logical network which is common due to the network complexity and size. VLAN is the note combination that is grouped with the single domain of the broadcast and the base is other than the physical location. as the router is not capable to pass through the broadcast, the domain is a network that acts as the recipient for the packets from the nodes located in the network .in In the local network, everything on the router is part of the same domain. A multiple broadcast domain switch is implicated on the VLAN. like the router, but to connect one VLAN to another and router is required. The VLAN is set with the use of most switches and log in the switch through telnet and enter the VLAN parameters such as the name, port, domain, etc. The reason to use the VLANs are listed below:

    Security:

    The system that contains sensitive information is distinguished from the network by VLANs and it will reduce the chance that people who are not authorized access the system.

    Special application:

    Maintenance of the special application is easy with the use of VLAN which connects the nodes.

    Bandwidth:

    Monitoring the network with care permits the administrator to develop a VLAN connection that lessens the router hops number and enhances the bandwidth.

    The flow of traffic:

    The main purpose of the VLAN is to keep the broadcast traffic from the nodes which are not VLAN parts, which can lessen the broadcast. The access list provides the administrator with an access management method to view network traffic.

    Specialized job types:

    The VLANs are in use by the organization for the department that has the high traffic or the VLAN which is dedicated to specialized types.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: February 3, 2022In: Q & A

    Why Would A Summarized Static Route Be Configured On A Router?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on March 15, 2022 at 1:13 pm

    Why would a summarized static route be configured on a router? Answer: Configuration of the summarized static route occurs to minimize the routing table size. The summary route shows multiple networks. It is not capable to give a better route as compared to the routing protocol. The routing protocolRead more

    Why would a summarized static route be configured on a router?

    Answer: Configuration of the summarized static route occurs to minimize the routing table size. The summary route shows multiple networks. It is not capable to give a better route as compared to the routing protocol. The routing protocol may not lessen the size of the static route is in use.

    The static summary route can reduce the static route size and also minimize the administrator overhead which might put an impact on the memory use of the router. The efficient use of the summary route maintains the huge number of static route in a routing table, which in return reduce the chance of the error. Instead of the multiple static routes, the single summary route is useful to incase these two have the same prefix length. The static summary route configuration is the same as the static route.

    Route summarization is the method to advertise the multiple addresses to a single address with a specified and short subnet mask. CIDR is the same as the supernetting which is also the route summarization type. CIDR work is to look over the class boundary and permits the summarization with a subnet mask which is small in size, unlike the default subnet masks.it will help to lessen the routes, routing updates, memory, CPU use, and the fast-routing table lookups. The steps to calculate the static route summarization are listed below:

    • Write the address which needs to be summarized.
    • Look for the subnet mask. Start from the left bit and move toward the right, check the bit that matches till to the unmatching column.it signifies the summary boundary.
    • Count the far-left bits which match. Suppose it is 22, a/22 it will lookup for the subnet mask, in the form of slash notation for the summarized route.
    • To locate the network address, copy 22 bits and at the end add the 0 bit.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: February 3, 2022In: Q & A

    When Using The Route Command At A Command Prompt, Which Entry Indicates The Default Route?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on March 15, 2022 at 1:13 pm

    When using the route command at a command prompt, which entry indicates the default route? Answer: An entry that indicates the default route in the command prompt when you use the route command is the network destination 0.0.0.0 while Netmask 0.0.0.0. The route command allows performing the manual eRead more

    When using the route command at a command prompt, which entry indicates the default route?

    Answer: An entry that indicates the default route in the command prompt when you use the route command is the network destination 0.0.0.0 while Netmask 0.0.0.0.

    The route command allows performing the manual entry in the routing table. Route command help to differentiate between the routes to host and route to network with the help of interpretation of the network address of the destination variable. With the help of the /etc/host file or the server’s name, route commands translate or solve the symbolic name to addresses.

    The specific particular host routes are separated from the network with the interpretation of the internet address linked with the destination. The phs net and -host commands force the interpretation of the destination on a network. If the destination has an address of INADDR-ANY or any kind of symbolic name, then its route assumes as a network, otherwise, it is considered as the host.

    If the route is from the interface and not from the gateway the interface argument is used.it is the host address on a common network, that indicates that an interface is used for transmission. The -netmask has to follow by an address parameter. Because it can be overriding the implicated network mask which is created in the -inet case to make sure it can follow the destination parameter.

    If the -f  or flash command is used then the route will clear the routing table gateway entries. You can also choose the routes whose destination from a provided address, by dominating the optional ph describe the address family. The command netstat -r shows the current routing data present in the routing table.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: February 3, 2022In: Q & A

    What Is A Characteristic Of A Default Static Route?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on March 2, 2022 at 5:50 pm

    What is a characteristic of a default static route?​ Default static route uses the single network address which on one destination sends the multiple static routes. The route which is discovered by the dynamic protocol is backup by default static route. The gateway of the IP address is identified byRead more

    What is a characteristic of a default static route?​

    • Default static route uses the single network address which on one destination sends the multiple static routes.
    • The route which is discovered by the dynamic protocol is backup by default static route.
    • The gateway of the IP address is identified by the default static path on which the router sends the IP address for those who have no learned or static path.
    • The original dynamic protocol is configured along with a high administrative distance.

    Answer: A predefined static path corresponds to almost all IP packets. The gateway of the IP address is identified by the default static route to which the router sends the IP address for those who do not have a learned or static route. The default route is a route with 0.0.0.0/0 as IPv4 destination address. The default static path configuration forms the last gateway from the station.

    The default static route characteristics are listed in the following:

    • It is generally configured on the customer router.
    • On the customer network, it is redistributed.
    • On BGP the customer route is distributed again and a default route is configured on the customer route.
    • It has a manual configuration method.
    • The path for the routing is constant or fixed.
    • Once it is created then it will be permanent.
    • It has no notification system.
    • The default static route is considered as one way.

    This will help the protocol of routing that it does have to add any kind of redundancy and just add the complexity. On the customer edge router, a default static route exists and points at the interface serial 0. if the serial decreases then the route becomes invalid. in the OSPF procedure, the default-information originate command is executed on the customer route, that’s why the route declares a route in the OSPF for as long as the valid default route is present in it.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 9 10 11 12 13 … 29

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Shailendra Yadav

    Troubleshooting with TR-069 ACS for ISPs 

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}