Posts

Showing posts from April, 2021

नवीन पोस्ट..

Complete Blender Course for Beginners – Creating a Knife Set.

Image
  Complete Blender Course for Beginners – Creating a Knife Set Complete Blender Course for Beginners – Creating a Knife Set What You will Learn :- Use Blender 3.2 and in general understand it's interface 3D Modeling UV Unwrapping Create materials with free PBR textures Lighting using Easy-HDRI You learn retopoligy for small parts of the models GET ON UDEMY JOIN OUR TELEGRAM CHANNEL 

Password Perspectives Quiz Answers Nse 1 Information Security Awareness Fortinet

Image
 Question 1: Which practice should you implement for backups? • Encrypt the backup data for an extra layer of protection. • Keep a backup device physically connected to the host • Use multiple backup vendors for redundancy. • Always back up your data in the cloud. Question 2: Which rule is best to follow for securing passwords? • Use a combination of seemingly random upper and lowercase letters, numbers, and special characters that is easy to remember but difficult to guess. • Never leave your password on a sticky note stuck to your monitor. Instead, hide under your keyboard. • Use something that you would never forget, like the name of your family pet. • Use a predictable pattern of numbers or letters. Question 3: Which two characteristics are examples of poor passwords? (Cho two.) A predictable sequence of numbers or words A commonly used word or unchanged default password A memorable passphrase written as a random sequence of keyboard keys A combination of random letters, numbers,

CCNA Routing basic interview Question and answers Part 2

Image
CCNA Routing Basic Interview Question & Answers Part  2   Q26. Explain what is a source route? Ans. The source route is defined as a sequence of IP addresses that are used to identify the route of a datagram. You can also involve the source route in the IP datagram header.   Q27. What is the difference between ‘standard’ and ‘extended’ ACL (access control list)? Ans. Standard ACLs are source-based, whereas extended ACLs are source- and destination-based.   Q28. What is data encapsulation? Ans. Data encapsulation is the process of breaking down information into smaller, manageable chunks before their transmission across the network.   Q29. What is RAS? Ans. RAS (Remote Access Services) refers to any combination of hardware and software to enable remote access to tools or information that typically reside on a network of IT devices.   Q30. Mention the different network protocols that are supported by Windows RRAS services? Ans. Following are the three main network protocols supported

CCNA Routing basic Interview Question and answers Part 1

Image
 What is a Computer Network? ...   A computer network is a group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.  What are the different types of networks? Considering the size or span of a network, we can classify them as follows: PAN (Personal Area Network) – PAN is made up of devices used by a single person. It has a range of a few meters. WPAN (Wireless Personal Area Network) – It is a PAN network that uses wireless technologies as a medium. LAN (Local Area Network) – LAN is a network whose range is limited to a relatively small area, such as a room, a building, an airplane, etc. WLAN (Wireless Local Area Network) – WLAN is a LAN network that uses wireless means of communication. It is a widely used configuration due to its scalability and because it does not require the installation of cables. CAN (Campus Area Network) – A network of high-speed device