This site works best with JavaScript enabled
Sign In
Discussions
Activity
Sign In
All
2. Explain significance of 'Interpret as Control' (IAC) character in TELNET's communication protocol
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 21
014.06.18.Network Virtual Terminal
1. How does TELNET handle the translation of characters from a local terminal to NVT form
0
★
4
B
2
E
Most recent by
mohdmohsinkhanee
February 21
014.06.18.Network Virtual Terminal
5. In the context of TELNET, what role does the Pseudoterminal driver play
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 21
014.06.16.General-Working-Telnet
4. How keystrokes are transmitted from a user's terminal to a remote system using TELNET
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 21
014.06.16.General-Working-Telnet
3. How does TELNET differentiate between local and remote logins
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 21
014.06.16.General-Working-Telnet
2. Explain significance of TELNET's reliance on the TCP/IP protocol for virtual terminal services
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 21
014.06.16.General-Working-Telnet
1. What is TELNET, and how does it function within computer networks?
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 21
014.06.16.General-Working-Telnet
5. With secure protocols like SSH, in what scenarios might Telnet still be preferred or required,why
0
★
4
B
1
E
Most recent by
mohdmohsinkhanee
February 21
014.06.14.General Working. Telnet
4. Given Telnet's lack of encryption and susceptibility to security threats, how would you mitigate
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 21
014.06.14.General Working. Telnet
3. Discuss the negotiation process that occurs once a Telnet connection is established
0
★
4
B
2
E
Most recent by
mohdmohsinkhanee
February 21
014.06.14.General Working. Telnet
2. Can you explain the client-server model in context of Telnet, its importance for remote mgt
0
★
4
B
2
E
Most recent by
mohdmohsinkhanee
February 21
014.06.14.General Working. Telnet
1. What is the significance of Telnet operating on top of the TCP/IP protocol stack
0
★
4
B
1
E
Most recent by
mohdmohsinkhanee
February 21
014.06.14.General Working. Telnet
Understanding Virtual and Pure Virtual Functions in C++
0
★
1
B
1
E
Started by
mohdmohsinkhanee
February 20
Pravjot Sir Classes
1. Discuss security implications of using Telnet for remote access, explain why SSH is recommended
0
★
2
B
2
E
Most recent by
mohdmohsinkhanee
February 19
014.06.28.Secure telnet with FirewallD. Fedora.
5.a friend's machine at 192.168.34.37 is unable to send you email due to a blocked connection?
0
★
3
B
3
E
Most recent by
mohdmohsinkhanee
February 19
014.01.58.Setting Firewall Rules
4. Explain the significance of the rule "iptables -A INPUT -s 192.168.34.37 -j ACCEPT"
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 19
014.01.58.Setting Firewall Rules
3. Describe the command used to block communication from a specific IP address to your machine
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 19
014.01.58.Setting Firewall Rules
2. What does "iptables -P FORWARD DROP," do? how does it affect the packet-filtering system
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 19
014.01.58.Setting Firewall Rules
1. Can you explain how the iptables system works in practice?
0
★
3
B
3
E
Most recent by
mohdmohsinkhanee
February 19
014.01.58.Setting Firewall Rules
5. In the filter table of iptables, three basic chains are mentioned: INPUT, OUTPUT, and FORWARD
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 19
014.01.56.Linux Firewall Basics
4. The text introduces iptables as the system for creating and manipulating firewall rules in Linux.
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 19
014.01.56.Linux Firewall Basics
3. What criteria do firewalls typically use to drop, reject, or accept packets
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 19
014.01.56.Linux Firewall Basics
2. In the context of Linux, how are firewall rules organized,relationship between chains and tables
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 19
014.01.56.Linux Firewall Basics
1. Why is it essential for routers to include a firewall in network configurations?
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 19
014.01.56.Linux Firewall Basics
6. Explain the significance of the init process in the Linux boot process.
0
★
4
B
1
E
Most recent by
mohdmohsinkhanee
February 17
009.01.Linux Boot Process
5. What is the purpose of initramfs in the Linux boot process, and in what scenarios is it used?
0
★
4
B
2
E
Most recent by
mohdmohsinkhanee
February 17
009.01.Linux Boot Process
4. Describe the sequence of events during kernel initialization in the Linux boot process
0
★
4
B
3
E
Most recent by
mohdmohsinkhanee
February 17
009.01.Linux Boot Process
3. What are the key responsibilities of the bootloader in the Linux boot process
0
★
4
B
3
E
Most recent by
mohdmohsinkhanee
February 17
009.01.Linux Boot Process
5. What advantages do custom Linux firmware distributions, such as OpenWRT, provide when installed
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 17
014.01.54.Routers And Linux
4. release of source code by Linksys and emergence of specialized Linux distributions like OpenWRT
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 17
014.01.54.Routers And Linux
3. Explain role of Linux in development of router software. what steps did they take to adapt
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 17
014.01.54.Routers And Linux
2. Describe the specialized router hardware that manufacturers developed in response to the demand
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 17
014.01.54.Routers And Linux
1. How did the evolution of broadband usage lead to the demand for routers, and why did Linux users,
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 17
014.01.54.Routers And Linux
Queries-12.File Operations and Commands
0
★
1
B
1
E
Started by
pravjot
February 17
011.12.File Operations and Commands
5.What kernel configurations, iptables support are required to set up a Linux machine as NAT router
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 17
014.01.52.Network Address Translation. IP Masquerading
4.whatis the need for dissecting packets beyond internet layer, particularly focusing on UDP,TCP
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 17
014.01.52.Network Address Translation. IP Masquerading
3. Why is NAT necessary for hosts on a private network to communicate with the internet
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 17
014.01.52.Network Address Translation. IP Masquerading
2. Walk through the steps involved in the NAT process as described in the text.
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 17
014.01.52.Network Address Translation. IP Masquerading
1. Can you explain the concept of Network Address Translation (NAT) and its significance
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 17
014.01.52.Network Address Translation. IP Masquerading
5.What challenge arises when hosts on private subnets attempt to communicate with the outside world
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 17
014.01.50.Private Networks IPv4
4. Why is a small subnet like 10.23.2.0/24 considered a suitable choice, what is class C subnets
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 17
014.01.50.Private Networks IPv4
3.explain the significance of RFC 1918, 6761 in the context of selecting IP subnets for private nw
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 17
014.01.50.Private Networks IPv4
2. What is the primary difference between using a block of internet addresses from your ISP
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 17
014.01.50.Private Networks IPv4
1. When setting up your own network, why is the choice of IP subnet an important consideration
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 17
014.01.50.Private Networks IPv4
5. Why is Network Address Translation (NAT) essential for providing internet connectivity to hosts
0
★
4
B
2
E
Most recent by
mohdmohsinkhanee
February 17
014.01.48.Configuring Linux as Router
4. What command is used to enable IP forwarding in the Linux router's kernel
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 17
014.01.48.Configuring Linux as Router
3. Explain the purpose of the routing table entries shown in the provided excerpt
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 17
014.01.48.Configuring Linux as Router
2. In the given example(figure below), what are the IP addresses assigned to the router for the LAN
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 17
014.01.48.Configuring Linux as Router
1.How can you configure a Linux machine to function as a router with multiple physical n/w
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 17
014.01.48.Configuring Linux as Router
2. Describe process of connecting to a web server using telnet, retrieving HTML source of webpage
0
★
1
B
2
E
Started by
pravjot
February 16
014.06.30.Using Telnet in Linux
1. How would you use telnet to troubleshoot a connectivity issue with an SMTP server
0
★
1
B
1
E
Started by
pravjot
February 16
014.06.30.Using Telnet in Linux
5. For Telnet usage, why is it recommended to create a new user instead of using the root account
0
★
1
B
1
E
Started by
pravjot
February 15
014.06.26.Using Telnet in Linux
4. How do you allow the Telnet port through firewall on both Red Hat-based, Ubuntu/Debian systems
0
★
1
B
1
E
Started by
pravjot
February 15
014.06.26.Using Telnet in Linux
3. What steps are involved in configuring the Telnet service on a remote machine to ensure it's up
0
★
1
B
1
E
Started by
pravjot
February 15
014.06.26.Using Telnet in Linux
01.Introduction to Networks and Configurations. Queries and Points to Ponder
0
★
1
B
3
E
Started by
pravjot
February 11
014.01.Intro to NW and Configurations
Network Applications and Services: Queries and Points to Ponder...
0
★
1
B
1
E
Started by
pravjot
February 11
014.02.Network Applications and Services
3. Discuss specific use cases for Telnet. Why Telnet might still be chosen over more secure alternat
0
★
2
B
4
E
Most recent by
gaurav133232
February 8
014.06.12.Introduction-To-Telnet
2. Can you explain the client-server model of Telnet and how it establishes a connection
0
★
2
B
1
E
Most recent by
gaurav133232
February 8
014.06.12.Introduction-To-Telnet
1. The evolution of nw protocols impacted relevance, security of Telnet in networking
0
★
2
B
2
E
Most recent by
gaurav133232
February 8
014.06.12.Introduction-To-Telnet
5.Linux utilities iw and wpa_supplicant in the context of configuring wireless networks.
0
★
2
B
1
E
Most recent by
gaurav133232
February 8
014.01.64.Wireless Ethernet
4. How does Linux handle wireless network authentication and encryption
0
★
2
B
1
E
Most recent by
gaurav133232
February 8
014.01.64.Wireless Ethernet
3. Describe roles of access points in managing wireless nws,how they bridge wired, wireless nws
0
★
2
B
1
E
Most recent by
gaurav133232
February 8
014.01.64.Wireless Ethernet
2. What are the key components of wireless networks that require additional configuration tools in L
0
★
2
B
1
E
Most recent by
gaurav133232
February 8
014.01.64.Wireless Ethernet
1. Explain main diff bwn wired, wireless Ethernet networks, wrt. components in the physical layer
0
★
2
B
2
E
Most recent by
gaurav133232
February 8
014.01.64.Wireless Ethernet
3. Apart from using firewalld,what other security measures should be implemented to enhance security
0
★
2
B
2
E
Most recent by
nirmalpg124
February 8
014.06.28.Secure telnet with FirewallD. Fedora.
Queries
0
★
1
B
2
E
Started by
pravjot
February 6
014.06.Network Protocol Telnet
2. How to configure a firewall in Fedora Linux to secure a Telnet connection
0
★
1
B
1
E
Started by
pravjot
February 6
014.06.28.Secure telnet with FirewallD. Fedora.
5. Why does ARP only apply to machines on local subnets
0
★
2
B
1
E
Most recent by
gaurav133232
February 5
014.01.62.Ethernet-IP-ARP-NDP-IQs
4.explain the step-by-step process through which the MAC addresses get added to the cache
0
★
2
B
2
E
Most recent by
gaurav133232
February 5
014.01.62.Ethernet-IP-ARP-NDP-IQs
3.ARP cache ($ ip -4 neigh), what does each field represent
0
★
2
B
2
E
Most recent by
gaurav133232
February 5
014.01.62.Ethernet-IP-ARP-NDP-IQs
014.01.62.2. How does the ARP cache facilitate efficient communication in a network
0
★
2
B
1
E
Most recent by
gaurav133232
February 5
014.01.62.Ethernet-IP-ARP-NDP-IQs
1.role of the Address Resolution Protocol (ARP) in the context of IP over Ethernet
0
★
2
B
1
E
Most recent by
gaurav133232
February 5
014.01.62.Ethernet-IP-ARP-NDP-IQs
5. Discuss the significance of the global network prefix in stateless IPv6 configuration
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 5
014.01.46.Automatic IPv6 Network Configuration. IQs
4. global IPv6 address in a stateless configuration? router advertisement (RA) messages play
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 5
014.01.46.Automatic IPv6 Network Configuration. IQs
3. Describe the initial steps involved in stateless IPv6 network configuration
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 5
014.01.46.Automatic IPv6 Network Configuration. IQs
2.Explain the concept of stateless configuration in IPv6
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 5
014.01.46.Automatic IPv6 Network Configuration. IQs
1.What are some of the assumptions on which DHCP relies for its effective functioning
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 5
014.01.46.Automatic IPv6 Network Configuration. IQs
5.Discuss the two DHCP clients ISC dhclient and systemd-networkd DHCP client
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 5
014.01.44.Understanding DHCP
4.Explain the lease concept in DHCP
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 5
014.01.44.Understanding DHCP
3.what device typically acts as the DHCP server
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 5
014.01.44.Understanding DHCP
2.Describe the process a host follows to obtain its configuration using DHCP
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 5
014.01.44.Understanding DHCP
1.Why is DHCP commonly used in IPv4 networks,what advantages does it offer to nw admin
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 5
014.01.44.Understanding DHCP
5. Discuss the potential consequences and precautions mentioned regarding the execution of iptables
0
★
2
B
1
E
Most recent by
gaurav133232
February 5
014.01.60.Firewall Strategies
4.Explain steps involved in configuring iptables to allow ICMP traffic, particularly for ping
0
★
2
B
2
E
Most recent by
gaurav133232
February 5
014.01.60.Firewall Strategies
3. Why is it crucial to allow only trusted packets and deny everything else when configuring firewal
0
★
2
B
1
E
Most recent by
gaurav133232
February 5
014.01.60.Firewall Strategies
2.firewall strategies,what are the two fundamental scenarios discussed for protecting machines
0
★
2
B
1
E
Most recent by
gaurav133232
February 5
014.01.60.Firewall Strategies
1. Enhancing the security of an individual machine by configuring firewall rules in the INPUT chain
0
★
2
B
2
E
Most recent by
gaurav133232
February 5
014.01.60.Firewall Strategies
10.How does UDP handle error detection
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 4
014.01.42.The Transport Layer TCP UDP Services.
9.an application that uses UDP,explain why it is well-suited for that particular app
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 4
014.01.42.The Transport Layer TCP UDP Services.
8.Why is UDP considered a simpler transport layer than TCP
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 4
014.01.42.The Transport Layer TCP UDP Services.
7.Compare and contrast TCP and UDP, highlighting their approaches to data transmission
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 4
014.01.42.The Transport Layer TCP UDP Services.
6.Describe the characteristics of TCP as a transport layer protocol
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 4
014.01.42.The Transport Layer TCP UDP Services.
5.purpose of the /etc/services file in relation to well-known port numbers
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 4
014.01.42.The Transport Layer TCP UDP Services.
4.open TCP connections on a Linux machine using the netstat command
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 4
014.01.42.The Transport Layer TCP UDP Services.
3.How does a process initiate a TCP connection,what distinguishes the client from server
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 4
014.01.42.The Transport Layer TCP UDP Services.
2.the concept of TCP ports and their significance in establishing connections
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 4
014.01.42.The Transport Layer TCP UDP Services.
1. What is the role of transport layer protocols in networking
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 4
014.01.42.The Transport Layer TCP UDP Services.
10.significance of the loopback interface (lo) in network configuration
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 4
014.01.40.Resolving Hostnames
9./etc/nsswitch.conf file and its role in controlling name-related precedence settings
0
★
3
B
5
E
Most recent by
mohdmohsinkhanee
February 4
014.01.40.Resolving Hostnames
8.How can you check the current DNS settings on a Linux system
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 4
014.01.40.Resolving Hostnames
‹
1
2
3
4
5
6
7
…
14
›
Powered by
Vanilla
Howdy, Stranger!
It looks like you're new here. If you want to get involved, click one of these buttons!
Sign In
Apply for Membership
Categories
All Discussions
0
000 Linux System Administration
24
001 C Programming, Data Structures
78
002 OOPs using C++ with Eclipse on Linux
22
003 Linux System Programming
39
004 Linux Network Programming
9
005 Character Device Drivers Development
21
006.Project Evolution with GitLab
1
» 01.Introduction To GitLab
1
008 Block Device Driver Development
3
009 Embedded Linux-ARM. Storage
37
» 009.01.Linux Boot Process
27
» 009.01.14.Linux-Boot-Process
5
» 009.01.15.Introduction to BIOS
0
» 009.01.16.Introduction-to-BIOS-IQs
5
» 009.01.18.Introduction-to-BIOS-IQs
5
» 009.01.20.BIOS CMOS UEFI. IQs
5
» 02.Introduction To Embedded Linux
1
» 009.03.01.ARM Processor Architecture
1
» 009.03.02.Programmers Model
1
010 Embedded Linux ARM, Configuring and Porting using Storage
0
011 Shell Scripting using Bash
7
» 011.12.File Operations and Commands
1
012 Linux Kernel Architecture and Internals
3
014. Linux Network Administration
270
» 014.01.Intro to NW and Configurations
220
» 014.01.12.Introduction to Networking
10
» 014.01.14.Packets-IQs
10
» 014.01.16.NetworkLayers
10
» 014.01.18.The Internet Layer
20
» 014.01.20.routes and the kernel routing table
10
» 014.01.22.The Default Gateway
5
» 014.01.24.IPv6 Addresses And Networks
20
» 014.01.26.Basic ICMP And DNS Tools
10
» 014.01.28.The Physical Layer And Ethernet
5
» 014.01.30.Understanding Linux Network Interface
5
» 014.01.32.Intro To Network Interface Configuration
5
» 014.01.34.Boot Activated Network Configuration
5
» 014.01.36.Manual and Boot Activated Nw Config
5
» 014.01.38.Network Configuration Managers
10
» 014.01.40.Resolving Hostnames
19
» 014.01.42.The Transport Layer TCP UDP Services.
10
» 014.01.44.Understanding DHCP
5
» 014.01.46.Automatic IPv6 Network Configuration. IQs
5
» 014.01.48.Configuring Linux as Router
5
» 014.01.50.Private Networks IPv4
5
» 014.01.52.Network Address Translation. IP Masquerading
5
» 014.01.54.Routers And Linux
5
» 014.01.56.Linux Firewall Basics
5
» 014.01.58.Setting Firewall Rules
5
» 014.01.60.Firewall Strategies
10
» 014.01.62.Ethernet-IP-ARP-NDP-IQs
5
» 014.01.64.Wireless Ethernet
5
» 014.02.Network Applications and Services
11
» 014.02.12.Basics of Services
3
» 014.02.14.Introduction to Network Servers
2
» 014.02.16.Network Servers. Secure Shell
5
» 014.06.Network Protocol Telnet
38
» 014.06.12.Introduction-To-Telnet
3
» 014.06.14.General Working. Telnet
5
» 014.06.16.General-Working-Telnet
5
» 014.06.18.Network Virtual Terminal
3
» 014.06.20.More About Telnet
3
» 014.06.22.Installing Telnet on Fedora
5
» 014.06.24.Telnet Commands-Fedora
3
» 014.06.26.Using Telnet in Linux
5
» 014.06.28.Secure telnet with FirewallD. Fedora.
3
» 014.06.30.Using Telnet in Linux
2
015 Python with Eclipse on Linux
27
101 Advanced Data Structures using C
18
105 Parallel Port Device Drivers Development
5
205 Serial Port Device Drivers Development
3
303 Linux System Programming
32
Project 22. Ethernet Network Device Driver Development
0
Query
555
Project.203 Linux System Programming. MySQL
0
Pravjot Sir Classes
160
Events at EmbLogic
2
Project 16: SPI Device Driver Development
2
Project 17: I2C Device Driver Development
0
Project 18: PCI Device Driver Development
0
Project 19: Embedded Linux on ARM Using Network TFTP
0
Project 20: CAN Bus Protocol and Driver Development
0
Project 21: USB Device Drivers Development
0
Embedded Linux
0
ARM Embedded Processor
0
Training
2
Members Area
1
Word From Admin
1