1.
What is the purpose of subnetting ?
Used in IP Networks to break up larger networks into multiple smaller subnetworks. It is used to reduce network traffic, Optimized network performance.It helps to identify and isolate network problems easily.
2.
What is cider?
CIDR (Classless Interdomain Routing) pronounced as cider for short. It was created for solving the problems introduced by Class A -E addressing scheme.
And it is used to prevent the ip address space depletion.
CIDR uses a masking technique to determine the target network and eleminating the limitations of classful configuration and preventing the waste of ip address in the classful addressing scheme.
And it is used to prevent the ip address space depletion.
CIDR uses a masking technique to determine the target network and eleminating the limitations of classful configuration and preventing the waste of ip address in the classful addressing scheme.
3.
Tell me what is VLSM and its purpose.
VLSM means Variable length subnet mask.
It is an advanced form of subnetting that allows subnets of variable lengths to all coexist under one network.
The purpose of VLSM is to adjust your simple, same size subnets to better accommodate the size requirements of your physical networks.
It is an advanced form of subnetting that allows subnets of variable lengths to all coexist under one network.
The purpose of VLSM is to adjust your simple, same size subnets to better accommodate the size requirements of your physical networks.
4.
Benefits of IP v6 ?
- IPv6 has larger address space
- It supports stateless autoconfiguration.
- It has more efficient packet headers than IPv4.
- It supports multicasting
- More secure than ipv4
- It has additional mobility features and it has integrated qos.
5.
What is stateless autoconfiguration in IPv6 ?
This feature is used to generate an ip address without the need of dhcp server.
Here Routers send the RAs (Router advertisements) to the network hosts containing first 64 bits of the 128 bit network address.
The second half of the address is generated by the host. this allows the host to keep hardware addresses hidden for the security reasons.
Here Routers send the RAs (Router advertisements) to the network hosts containing first 64 bits of the 128 bit network address.
The second half of the address is generated by the host. this allows the host to keep hardware addresses hidden for the security reasons.
6.
Tell me the advantages of IP SEC ?
It gives the following advantages :-
- Performance
- Network Layer security
- Scalability
- Versatile
- Universal acceptance
- Application independance
7.
Disadvantages of IP sec ?
Here is a list of IP sec disadvantages:-
- Performace
- Security
- Complexity
- Firewall Restriction
- Management
8.
What are the advantages of ssl ?
The advantages are as follows :--
- Interoperability: It supports different vendors softwares and applications.
- Management: SSL makes deployment and management and administration tasks simple and effective. No need to install additional client softwares.
- Cost: Its very cheap and no special licenses are required.
- Granular structure : It provides finely detailed client access policies based on user identity and profile.
- Firewall and NAT operation : SSL uses TCP port 443 (HTTPS), which is open on most networks, allowing SSL VPNs to operate without extra administrative overhead.
- Security :By only allowing access to certain applications, security mitigation is increased, and the threat of attack is minimized
- Application layer functionality: SSL eliminates IP-based address management problems by operating at the transport layer and provides services to the upper layers.
9.
What is SLIP ?
Serial Line Internet Protocol (SLIP) is a very simplistic, nonstandard protocol used to frame and transmit IP datagrams over serial connections. Due to its inflexible design, SLIP does not provide additional features such as encryption, authentication, or error detection .
10.
What are the security problems we face if we use PAP ?
PAP does not use any type of encryption to send usernames and passwords over the link. All authentication data is sent in clear text over the wan link, which is huge security risk.
PAP is extremely vulnarable to various forms of malicious attack, such as password guessing or other brute force attacks.
The PAP remote client controls the amount of authentication attempts to the authentication server or other brute force attacks. This means an attack could continure indefinitely against a PPP authentication server.
PAP is extremely vulnarable to various forms of malicious attack, such as password guessing or other brute force attacks.
The PAP remote client controls the amount of authentication attempts to the authentication server or other brute force attacks. This means an attack could continure indefinitely against a PPP authentication server.
No comments:
Post a Comment