How do we do encryption and authentication in L2TP?
No Answer is Posted For this Question
Be the First to Post Answer
As a system administrator, you need to provide your routers with a Domain Name System (DNS) server. How many DNS servers can you specify with one command? A. 6 B. 1 C. 2 D. 4
What is the routing metric used by RIP? A.) Route poisoning B.) Split horizon C.) Hop Count D.) TTL
4 Answers jetking, Tata Motors,
what is ACLs? what is the reasons to create ACLs?
Given an IP host address of 172.16.2.160 and a shored mask of 255.255.255.192 to which shored does the host belong? A. 172.16.2.32 B. 172.16.2.64 C. 172.16.2.96 D. 172.16.2.128 E. 172.16.2.192
Identify 3 characteristics of an IP address? A.) Contains a network portion and a host portion B.) 32 bits long C.) Unique to each network D.) Part of the default Cisco configuration E.) Referred to as the hardware address
What’s the default CDP holdtime in seconds for Cisco routers?
What cable called v.35?
hi all.. can any one explain the complete topology of stp and rstp how it works . root swtch connects to a root port and then root port conenct to other switchs designated port. i was going thru his site http://www.cisco.com/en/US/tech/tk389/tk621/technologies_whi te_paper09186a0080094cfa.shtml in which DR also exist on root switch only which makes my understanding grim.I had a diff notion of stp all together. please post asap. and if possible refer a url so thst i can read it my self .. thanks
7. What is an advantage to using switches in your network? A. Addressing of hosts by DHCP B. Ease of administration C. Stops broadcast storms D. Works like a repeater
What is topology in ccna?
The Cisco IOS is stored where? A.) ROM B.) CD C.) Flash D.) NVRAM
Which of the following is an example of the Network Layer? A.) TCP B.) IP C.) SQL D.) Token Ring E.) LLC