I want access a protected network how do I access it?

1 Answer

Answer :

use a password

Related questions

Description : Can I set up a router without access to the main computer?

Last Answer : answer:A router has no “main” computer, it shares a single Internet connection among multiple computers, and any should be able to reach the setup screens. They aren’t quite all the same. What is the model number? With that we could give a better answer.

Description : If my DDWRT SPI firewall is enabled on the router, do I need to also engage the Windows (or another) firewall?

Last Answer : Here’s good article on this topic why you need separate firewall on how to geek

Description : Will the Buffalo WZR-HP-G300NH wireless router handle both "g" and "n" devices simultaneosuly?

Last Answer : answer: N is backward compatible, so yes. Both ways - 802.11g clients will connect with 802.11n routers, and 802.11n clients will connect with 802.11g routers. There may be ... wireless-reviews/29885?task=view&limit=1&start=6 http://www.buffalotech.com/support/getfile/WZR-HP-G300NH_Manual_web.pdf

Description : Linking two routers together?

Last Answer : Belkin use 192.168.2.1 as the root address for its routers

Description : Whats your favorite router?

Last Answer : I had a Linksys Router something with WRT of something. It was a G-router. Now I have an Airport Extreme from Apple. That’s an N-router. It works great and it’s very fast.

Description : Which of the following keywords are used to control access to a class member? A) default B) break C) protected D) goto

Last Answer : C) protected

Description : Consumers have the rights (i) to be protected against goods and services that are hazardous to life and property. (il) to assure wherever possible access to a variety of goods; and services at national prices. A. Both (i) ... (i) and (il) are wrong C. Only (i) is correct. D. Only (ii) is correct.

Last Answer : A. Both (i) and (il) are correct.

Description : Consumers have the rights (i) to be protected against goods and services that are hazardous to life and property (ii) to assure wherever possible access to a variety of goods and services at national prices. A. Both (i) ... (i) and (ii) are wrong. C. Only (i) is correct D. Only (ii) is correct.

Last Answer : A. Both (i) and (ii) are correct.

Description : What is WPA? a) wi-fi protected access b) wired protected access c) wired process access d) wi-fi process access

Last Answer : a) wi-fi protected access

Description : Describe use of protected access specifier used in the class.

Last Answer : Protected access specifier is use to declare a class member that is accessible by the member functions within its class and any class immediately derived from it.

Description : What is the purpose of ‘protected’ access specifier used in C++?

Last Answer : Protected access specifier: 1. Protected access specifier is mainly used in inheritance in C++. 2. It uses protected keyword defined in C++ language. 3. Class members declared as protected can be accessed by ... as well as member function show() of its derived class as it is a protected member.

Description : 2 Wifi Routers/Access Points on the same network?

Last Answer : answer:That sounds normal to have to disconnect then reconnect. WiFi is not designed to hand off well, like phone cells are. There are industrial strength APs out there if you get tired of that. Ref the IPs, ... IP have to be in a certain range to work and do your AP and bridge have the IP ranges?

Description : Why can't I access (ping) my public IP from within my private network?

Last Answer : hold windows key+r then type cmd press enter Then type ipconfig it should show up. Or are you wondering how to change it?

Description : How can I get internet access on my openPandora using a cell phone network? Cheaper is better.

Last Answer : Yikes, sorry there are no answers on this, James. That's not really typical of ask-public. I'd guess that no one on the site knows about the openPandora or they just don't know what to do ... right? Have you found information on this topic via other avenues? Could you post it here if you have?

Description : My mac mini running 10.6.2 OS X self assign's itself an Ip instead of connecting right away to my network. Thus, can't access Internet till I correct it. Any advice mac friends?

Last Answer : Do you have it set to connect with DHCP? Pic

Description : How can i access a network ive been banned from?

Last Answer : Any computer using WIFI has a MAC address, which the network administrator can determine, and allow, or deny access to services, etc. If you do something they don't particularly allow, they can block your ... be something else Either way, talk to them, they might be able to allow you access again.

Description : How can I set up VPN under OSX and have network access at the same time?

Last Answer : That's how VPN works. Basically the driver operates at the hardware level, so you can't "switch" between the two networks.

Description : if i get a network hard drive will i be able to access it from anywhere?

Last Answer : answer:OS X Leopard will add easier networking and backup options, and if you get a new AirPort Extreme Base Station, your external hard drive can be attached to it and becomes a part of your network. Those items will be my next big Apple purchase, probably in the early part of next year. :)

Description : To prevent unauthorized access to and / or from the network, a system known as ......., can be implemented -Technology

Last Answer : To prevent unauthorized access to and / or from the network, a system known as Firewall, can be implemented by hardware and / or software.

Description : If you have implemented a network where hosts are assigned specific roles such as for file sharing and printing. Other hosts access those resources but do not host services of their own. what type of?

Last Answer : What is the answer ?

Description : What provides access to communications when there is no traditional network?

Last Answer : satellites

Description : If my internet access is slow, is it because of my network card, or my cable service?

Last Answer : Slow internet speed can be caused by both you cable service,and your network card,your system will need to be trouble shot.

Description : A computer checks the _____ of user names and passwords for 9 a match before granting access. 1) Website 2) Network 3) Backup file 4) Data base 5) None of these

Last Answer : Answer :4

Description : WAN is a most used abbreviation in Networking, what is its full form? A) WAP Area Network B) Wide Area Network C) Wide Array of Network D) Wireless Access Network

Last Answer : Answer : B

Description : A company wide network,closed to public access,which uses internet type technology is called a)Intranet b) Internet c) Extranet d)none of these

Last Answer : a)Intranet

Description : Which of the following is an application layer service? A) Network virtual terminal B) File transfer, access and management C) Mail service D) All of the above

Last Answer : C) Mail service

Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. error control sublayer

Last Answer : b. media access control sublayer

Description : Automatic repeat request error management mechanism is provided by ________ a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. application access control sublayer

Last Answer : a. logical link control sublayer

Description : Which protocols adopted the standards of HDLC (High Level Link Control) protocol? a. X.25 protocol as LAPB (Link Access Procedure Balanced, V.42 protocol as LAPM (Link Access Procedure for ... Services Digital Network) protocol as LAPD (Link Access Procedure on D channel) d. All the above

Last Answer : d. All the above

Description : NAT stands for……………………….. A. Node access teminal B. Node address Translation C. Network address translation D. Network address transmitter

Last Answer : C. Network address translation

Description : In the TCP/IP protocol architecture, the Network Access Layer includes ………………………………...layers of the OSI Reference Model. A. presentation, session, application B. physical, data link, network C. data link, network D. physical, data link

Last Answer : B. physical, data link, network

Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. error control sublayer

Last Answer : B. media access control sublayer

Description : Automatic repeat request error management mechanism is provided by ________ A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. application access control sublayer

Last Answer : A. logical link control sublayer

Description : What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? a. Internet b. Host to host c. Network Access d. Application

Last Answer : b. Host to host

Description : NAT stands for: a) Network Address Translator b) Network Access Translator c) Network Acquired Translator d) None of These

Last Answer : a) Network Address Translator

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : NAP stands for: a) Network Access Point b) Naptive Area Protocol c) Node for Assessing Patteern d) None of These

Last Answer : b) Network Access Point

Description : PAN stands for: a) Permanent Area Network b) Personal Access Network c) Personal Area Network d) None of These

Last Answer : c) Personal Area Network

Description : MAN stands for: a) Metropolitan Arranged Network b) Metropolitan Area Network c) Metropolitan Access Network d) Modem and Nexus e) None of These

Last Answer : b) Metropolitan Area Network

Description : WAN stands for: a) WAP Access Network b) Wireless Area Network c) Wide Area Network d) None of These

Last Answer : c) Wide Area Network

Description : SAN refers to: a)Storage Area Network b) Sample Annual Numbers c) Search Access Network d) None of These

Last Answer : a)Storage Area Network

Description : NAT stands for: a) Network Address Translation (Translation or translator same meaning) b) Network Address Transformation c) Network Access Translation d) None of These

Last Answer : a) Network Address Translation (Translation or translator same meaning)

Description : Which among the following is correct: a) A firewall is a system designed to prevent unauthorized access to or from a private network. b) Firewalls can be implemented in both hardware and software or a combination of both. c) Both of Above d) None of these

Last Answer : c) Both of Above

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : Internet access by transmitting digital data over the wires of a local telephone network is provided by  leased line  digital subscriber line  digital signal line  None of the Above

Last Answer :  digital subscriber line

Description : Which layer has access to particular network services, billing functions etc: a) Session Layer b) Presentation Layer c) Transport Layer d) None of These

Last Answer : a) Session Layer

Description : Which among the following is used to access the network: a) Application Layer b) Presentation Layer c) Session Layer d) None of These

Last Answer : a) Application Layer