Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Nilay Sharma

Level 30
Ask Nilay Sharma
482 Visits
0 Followers
0 Questions
Home/ Nilay Sharma/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: December 13, 2022In: Q & A

    How To Stop Email Spam Attack?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 13, 2022 at 8:32 pm

    1. Enable strong spam filtering: Use a strong spam filter to identify and block the email messages that are most likely to be spam. 2. Don’t click links in emails: Links in emails can be used by spammers to infect your computer with malicious software or provide attackers with access to sensitive inRead more

    1. Enable strong spam filtering: Use a strong spam filter to identify and block the email messages that are most likely to be spam.

    2. Don’t click links in emails: Links in emails can be used by spammers to infect your computer with malicious software or provide attackers with access to sensitive information. By not clicking on links, you can minimize the chances of being attacked.

    3. Unsubscribe from unwanted emails: Many companies offer their customers the ability to unsubscribe from promotional emails. If you find yourself receiving more spam than desired, this is an option you should consider.

    4. Be aware of phishing attempts: Phishing attacks use fake emails and websites in an attempt to trick unsuspecting users into giving up confidential information. Be aware of these attacks and do not click links or provide information in an email that you don’t trust.

    5. Block email addresses: You can block specific email addresses from sending emails to your address. This can be useful if you have been targeted by a specific individual or group.

    6. Practice caution when providing personal information: Spammers often try to collect personal information from their victims. Be sure to practice caution when providing any sensitive information, including phone numbers, addresses, credit card numbers, etc.

    7. Install anti–virus and anti–malware software: Anti–virus and anti–malware programs can help protect your computer from malicious software that is sent via email.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: December 13, 2022In: Q & A

    How Much Internet Does Remote Desktop Use?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 13, 2022 at 8:31 pm

    It depends on the application and usage. Typically, remote desktop applications use a moderate amount of internet bandwidth, usually in the range of 1-2 Mbps. The actual amount can vary widely depending on the number of users, the resolution of the screen being shared, any video conferencing or fileRead more

    It depends on the application and usage. Typically, remote desktop applications use a moderate amount of internet bandwidth, usually in the range of 1–2 Mbps. The actual amount can vary widely depending on the number of users, the resolution of the screen being shared, any video conferencing or file sharing that‘s in use, and other factors.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: December 13, 2022In: Q & A

    How To Enable Crypto Isakmp On Cisco Router?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 13, 2022 at 8:31 pm

    To enable Crypto ISAKMP on a Cisco router, you need to enter the following commands in global configuration mode: 1) crypto isakmp enable 2) crypto isakmp policy 1 3) authentication pre-share 4) encryption aes 5) hash sha 6) group 2 7) lifetime 86400

    To enable Crypto ISAKMP on a Cisco router, you need to enter the following commands in global configuration mode:

    1) crypto isakmp enable

    2) crypto isakmp policy 1

    3) authentication pre–share

    4) encryption aes

    5) hash sha

    6) group 2

    7) lifetime 86400

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: December 13, 2022In: Q & A

    How Many Transmission Control Protocol Tcp Control Flags Are There?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 13, 2022 at 8:30 pm

    There are 6 TCP control flags: SYN, ACK, FIN, RST, URG, and PSH.

    There are 6 TCP control flags: SYN, ACK, FIN, RST, URG, and PSH.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: December 13, 2022In: Q & A

    How To Configure Cisco Router For Internet Access?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 13, 2022 at 8:20 pm

    1. Connect the Cisco router to your Internet modem using an Ethernet cable. 2. Power on the router and the modem. 3. Use a computer connected to the router to access its web-based configuration utility by typing in the router's IP address in a browser. 4. Enter your username and password to login. 5Read more

    1. Connect the Cisco router to your Internet modem using an Ethernet cable.

    2. Power on the router and the modem.

    3. Use a computer connected to the router to access its web–based configuration utility by typing in the router‘s IP address in a browser.

    4. Enter your username and password to login.

    5. Set up your WAN connection type, configure your PPPoE or DHCP settings as applicable. Make sure to include the correct username and password if your ISP requires it.

    6. Configure your LAN settings such as IP address, subnet mask, and default gateway.

    7. Set up your wireless network settings for your wireless devices. This includes the SSID, type of security, and encryption key.

    8. Save your settings, reboot the router and modem, and you should now have internet access.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: December 13, 2022In: Q & A

    How To Set Environment Variable Linux?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 13, 2022 at 8:19 pm

    You can set an environment variable in Linux by using the `export` command. For example, to set an environment variable named `MYVAR` with the value “testing”, you would run the following command: `export MYVAR="testing"` To view the value of the environment variable, you can use the `echo` command:Read more

    You can set an environment variable in Linux by using the `export` command. For example, to set an environment variable named `MYVAR` with the value “testing”, you would run the following command:

    `export MYVAR=”testing“`

    To view the value of the environment variable, you can use the `echo` command:

    `echo $MYVAR`

    The output should be “testing“.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: December 13, 2022In: Q & A

    How To Connect Two Cisco Switches Together?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 13, 2022 at 8:18 pm

    1. Connect each switch with an Ethernet cable (100 Mbps or more). 2. Log into the command line of each switch and assign a unique IP address to each one. 3. Set up an access list on each switch to control what traffic is allowed from one switch to the other. 4. Create a trunk port on each switch thaRead more

    1. Connect each switch with an Ethernet cable (100 Mbps or more).

    2. Log into the command line of each switch and assign a unique IP address to each one.

    3. Set up an access list on each switch to control what traffic is allowed from one switch to the other.

    4. Create a trunk port on each switch that will be used for communication between the two switches.

    5. Configure VLANs (Virtual Local Area Network) on the switches to segment network traffic.

    6. Enable routing protocols in order to enable communication between the two switches.

    7. Test the connection by pinging each switch from the other, and verify that all ports are working correctly.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: December 13, 2022In: Q & A

    Routers Perform Routing At Which Osi Layer?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 13, 2022 at 8:18 pm

    Routers perform routing at the Network layer (layer 3) of the OSI model.

    Routers perform routing at the Network layer (layer 3) of the OSI model.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: December 13, 2022In: Q & A

    What Are Some Examples Of Computer Viruses?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 13, 2022 at 8:16 pm

    1. Trojan Virus 2. Spyware 3. Worms 4. Ransomware 5. Boot Sector Virus 6. Polymorphic Virus 7. Macro Virus 8. File-Infecting Virus 9. Mass-Mailing Worms 10. Adware

    1. Trojan Virus

    2. Spyware

    3. Worms

    4. Ransomware

    5. Boot Sector Virus

    6. Polymorphic Virus

    7. Macro Virus

    8. File–Infecting Virus

    9. Mass–Mailing Worms

    10. Adware

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: December 13, 2022In: Q & A

    How To Check Kernel Modules In Linux?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 13, 2022 at 8:15 pm

    1. Checking installed modules with lsmod: To list all the currently running modules, run the command: $ lsmod This command will output a table that includes all the loaded kernel modules, their sizes and their dependencies. 2. Inspecting the loaded modules in /proc/modules: The file located at /procRead more

    1. Checking installed modules with lsmod: To list all the currently running modules, run the command:

    $ lsmod

    This command will output a table that includes all the loaded kernel modules, their sizes and their dependencies.

    2. Inspecting the loaded modules in /proc/modules:

    The file located at /proc/modules contains a tabular listing of loaded kernel modules. It is possible to use a text editor such as vi or nano to inspect the content of this file.

    For example, $ sudo vi /proc/modules

    3. Using the modinfo command: The modinfo command allows the user to get detailed information about the parameters and usage of a particular module. To use it, run the following command:

    $ modinfo [module name]

    For example, to get information about the vboxdrv kernel module, type: $ modinfo vboxdrv

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 349 350 351 352 353 … 499

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • Farwa Khalid

    What Is A Typical Symptom Of A CMOS Battery Failure?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Communities
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut