Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Pratibha Bhardwaj

Bronze
Ask Pratibha Bhardwaj
25 Visits
0 Followers
0 Questions
Home/ Pratibha Bhardwaj/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: December 10, 2022In: Q & A

    Which Procedure Is Recommended When Cleaning Inside a Computer?

    Pratibha Bhardwaj
    Pratibha Bhardwaj Bronze
    Added an answer on December 10, 2022 at 5:32 pm

    It is recommended to use compressed air, canned air, or a vacuum cleaner with a brush attachment for cleaning inside a computer. Make sure the computer is powered off and disconnected from any power source before beginning the procedure. Use the compressed air or vacuum cleaner to remove dust and deRead more

    It is recommended to use compressed air, canned air, or a vacuum cleaner with a brush attachment for cleaning inside a computer. Make sure the computer is powered off and disconnected from any power source before beginning the procedure. Use the compressed air or vacuum cleaner to remove dust and debris from all internal components, including the fan, heatsink, power supplies, and hard drive. Be sure to work slowly and carefully to avoid damaging any components

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: December 10, 2022In: Q & A

    How To Enable Syslog In Cisco Router?

    Pratibha Bhardwaj
    Pratibha Bhardwaj Bronze
    Added an answer on December 10, 2022 at 5:31 pm

    To enable Syslog on Cisco routers, use the below commands: 1. Log into the router and enter configuration mode: router# configure terminal 2. Enable syslogging, creating a logging buffer in memory with the logging buffered command: router(config)# logging buffered <size> 3. Enable logging forRead more

    To enable Syslog on Cisco routers, use the below commands:

    1. Log into the router and enter configuration mode: router# configure terminal

    2. Enable syslogging, creating a logging buffer in memory with the logging buffered command: router(config)# logging buffered <size>

    3. Enable logging for all messages with the logging on command: router(config)# logging on

    4. Configure the router to send messages to your syslog server (or hosts) with the following command: router(config)# logging <syslog-server-IP>

    5. Exit configuration mode and save the router’s configuration. router# copy running-config startup-config

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: December 10, 2022In: Q & A

    How To Check Ospf Advertised Routes?

    Pratibha Bhardwaj
    Pratibha Bhardwaj Bronze
    Added an answer on December 10, 2022 at 5:29 pm

    The best way to check OSPF advertised routes is to use the 'show ip ospf route' command. This command will show all of the OSPF routes that are being advertised, as well as the associated metrics and administrative distances. You can also use the 'show ip route' command with the 'protocol ospf' arguRead more

    The best way to check OSPF advertised routes is to use the ‘show ip ospf route’ command. This command will show all of the OSPF routes that are being advertised, as well as the associated metrics and administrative distances. You can also use the ‘show ip route’ command with the ‘protocol ospf’ argument to view the same information.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: December 10, 2022In: Q & A

    How To Find Out What Type Of Dsl I Have?

    Pratibha Bhardwaj
    Pratibha Bhardwaj Bronze
    Added an answer on December 10, 2022 at 5:20 pm

    To find out what type of DSL you have, you'll need to contact your internet service provider (ISP). They will be able to provide you with the specific type of DSL you are using.

    To find out what type of DSL you have, you’ll need to contact your internet service provider (ISP). They will be able to provide you with the specific type of DSL you are using.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: December 10, 2022In: Q & A

    What Is a False Positive In Cyber Security?

    Pratibha Bhardwaj
    Pratibha Bhardwaj Bronze
    Added an answer on December 10, 2022 at 5:19 pm

    A false positive in cyber security is when a detection system incorrectly flags a benign file or activity as malicious. This can lead to significant consequences as it can block legitimate activities or lead to unnecessary alerts and resources being used

    A false positive in cyber security is when a detection system incorrectly flags a benign file or activity as malicious. This can lead to significant consequences as it can block legitimate activities or lead to unnecessary alerts and resources being used

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: December 10, 2022In: Q & A

    How Much Does Vpn Slow Down Internet?

    Pratibha Bhardwaj
    Pratibha Bhardwaj Bronze
    Added an answer on December 10, 2022 at 5:18 pm

    The actual speed of a VPN connection is determined by various factors including the speed of your internet connection, the hardware of your computer, and the type of VPN protocol you use. On average, using a VPN can slow down your internet connection by 10-20%. However, this can vary depending on thRead more

    The actual speed of a VPN connection is determined by various factors including the speed of your internet connection, the hardware of your computer, and the type of VPN protocol you use. On average, using a VPN can slow down your internet connection by 10-20%. However, this can vary depending on the specific configuration of your connection.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: December 10, 2022In: Q & A

    What Protocol Should Be Disabled To Help Mitigate Vlan Attacks?

    Pratibha Bhardwaj
    Pratibha Bhardwaj Bronze
    Added an answer on December 10, 2022 at 5:18 pm

    To help mitigate VLAN attacks, it is recommended to disable Spanning Tree Protocol (STP) as it can be used to exploit VLANs. It is also recommended to use secure protocols such as 802.1X and MAC Authentication Bypass (MAB) to further protect the network

    To help mitigate VLAN attacks, it is recommended to disable Spanning Tree Protocol (STP) as it can be used to exploit VLANs. It is also recommended to use secure protocols such as 802.1X and MAC Authentication Bypass (MAB) to further protect the network

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: December 10, 2022In: Q & A

    How Many Transmission Control Protocol Flags Are There?

    Pratibha Bhardwaj
    Pratibha Bhardwaj Bronze
    Added an answer on December 10, 2022 at 5:16 pm

    There are nine different Transmission Control Protocol flags. They are: SYN, FIN, RST, PSH, ACK, URG, ECE, CWR, and NS.

    There are nine different Transmission Control Protocol flags. They are: SYN, FIN, RST, PSH, ACK, URG, ECE, CWR, and NS.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: December 10, 2022In: Q & A

    How To Install Vpn Certificate On Windows 10?

    Pratibha Bhardwaj
    Pratibha Bhardwaj Bronze
    Added an answer on December 10, 2022 at 5:15 pm

      1. Open the Control Panel and navigate to Network and Internet > Network and Sharing Centre. 2. Under "Change your networking settings", select "Set up a new connection or network". 3. Select "Connect to a workplace" and hit Next. 4. Select "Use my Internet connection (VPN)" and enter theRead more

     

    1. Open the Control Panel and navigate to Network and Internet > Network and Sharing Centre.

    2. Under “Change your networking settings”, select “Set up a new connection or network”.

    3. Select “Connect to a workplace” and hit Next.

    4. Select “Use my Internet connection (VPN)” and enter the relevant details for the VPN connection.

    5. Select “Do not connect now; just set it up so I can connect later” and hit Next.

    6. On the following screen, select “Use a certificate on this computer or smart card” and hit Next.

    7. Select the certificate you wish to use from the drop-down menu, enter the password if applicable, and hit Next

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: December 10, 2022In: Q & A

    If You Are Subnetting a Class B Network, What Subnet Mask Will Yield 64 Subnets ?

    Pratibha Bhardwaj
    Pratibha Bhardwaj Bronze
    Added an answer on December 10, 2022 at 5:14 pm

    255.255.252.0

    255.255.252.0

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 8 9 10 11 12

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Shailendra Yadav

    Troubleshooting with TR-069 ACS for ISPs 

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}