2 Knowledge Base

 

 TelecomTrainning.net > Knowledge Base > Asterisk
 Article Listings
Good Evening, - Please register or - log-in to your account.
Search
Search   Saved Questions   Ask a question
Keywords 
 
Available categories
LTE
100 of Questions in LTE
CCNA Certification
CCNA Sample Q & A (1000 + Q &A)
(Network +) Certification
(Network +) Sample Q & A (1000 + Q &A)
Networking
General/Interview Q& A on Networking
Home Networking
General/Interview Q& A on Networking
VOIP, SIP & Asterisk
Q & A on VOIP,Ethereal, SIP & Asterisk
Telecom Test Equipments
Q & A on Telecom Test Equipment
PSTN / Wireline
General / Interview Q & A on PSTN / Wireline
LTE, Wireless, 3G ,Diameter and HSS
General/Interview Q & A on LTE, Wireless, 3G ,Diameter and HSS
Telecom General
Any Q & A in Telecom in General

Top Questions
Friends, Describe Secure storage and distribution of A-Keys?
what is the difference between E1 signal & Ethernet signal ?
How do I monitor SS7 Traffic in spectra2?
Can you tell me about PBGT?
Explain me the difference between a repeater, bridge and router? Relate this to the OSI model.
What is the difference between BRI & PRI ?
Guys what is the purpose of Umbrella Cell Approach in GSM ?
how can we explain media gateway in MSc?
What is GGSN?
What is the difference between Electrical-tilt and Mechanical-tilt of an antenna?
What is BSC?
What is demarc point?
Can any one explain me how sms flow will work using ss7 network ?( from physical layer to application layer)
why cellphone towers are painted in red and white?
Explain SLTA and SLTM messages in MTP3?
Hi guys what is WAP?
wat is the difference betweem MSC & GMSC, & MSS & GCS?
what is EDAp? what is the functions of EDAP?
What is a circuit id?
what is sdh?

Asterisk
Friends which algorithms and encryption protocols is as the basis for the Public Key Infrastructure system?
Charles - 04-October-2007 05:31:12 PM
 Anyone tell me, which protocols would be disabled on an e-mail server to prevent an unauthorized user from exploiting security vulnerabilities in network monitoring software?
Danny - 04-October-2007 05:30:57 PM
 Hello friends, tell me which protocol should be disabled on a critical network device such as a router?
suresh - 04-October-2007 05:30:41 PM
 Friends I have a doubt that, after trying to log in to a workstation for a third time, a user finds they're locked out of the system and can't make any more attempts. What's the most likely problem?
Andrew - 04-October-2007 05:30:27 PM
 Friends Which zone of a network security topology should contain your Internet servers, such as web, FTP, and e-mail servers?
Darwin - 04-October-2007 05:30:10 PM
 Anyone tell me, what communications product enables you to connect to a company LAN over the Internet through a secure, encrypted channel?
Chaim - 04-October-2007 05:29:45 PM
 Hello friends, tell me what can be done to protect the date on a laptop if it's stolen?
Camron - 04-October-2007 05:29:30 PM
 Friends I have a doubt that, Which wireless security mechanisms is the least secure?
bala - 04-October-2007 05:29:11 PM
 Friends Which wireless protocol standards delivers Wireless Markup Language (WML) content to w«b applications on hand-held devices?
Dalton - 04-October-2007 05:28:56 PM
 Anyone tell me, when you set up a new FTP server, what should you do first when creating accounts for your FTP users?
kalai - 04-October-2007 05:28:33 PM
 
Page:  1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23 24  

Search questions via popularity
Top viewed questions  Top emailed questions  Most printed questions  Most saved questions
 
Copyright © Telecom Training, All Rights Reserved