Which peer authentication method and which ipsec mode is used to connect to the branch locations?
No Answer is Posted For this Question
Be the First to Post Answer
Mention what command you must use if you want to delete or remove the configuration data that is stored in the nvram?
Which of the following protocols are used to get an IP address from a known MAC address? A.) BootP B.) TCP C.) IP D.) ARP E.) RARP F.) ICMP
Identify the default values that make up IGRP's composite metric? A.) Bandwidth B.) Load C.) Reliability D.) MTU E.) Delay
How do you disable advanced editing? A.) terminal editing B.) terminal no editing C.) disable editing D.) no terminal editing
take a pen and copy before solving that question there is a router name Ra there is two switch sw1 and sw2 sw1 is coneceted through fa0/1 interface of router Ra sw2 is conected through the fa1/1 serai interface of router s0/1 conected through the isp with it ip address 192.168.1.1 now therer are three host conexted through the sw1 and having ip host1=10.1.2.1 host2=10.1.2.2 host3=10.1.2.3 now there is also 3ree host conected through switch 2 i.e sw2 having ip host4=10.1.1.1 host 5=10.1.1.2 host 6=10.1.1.3 now i think u have made corect confrigation.now questios is started network admin configure the Ra router in that fassion Ra(config)#access-list 2 permit 10.1.1.0 0.0.0.255 Ra(config)#line vty 0 4 ra(config)#access-class 2 in now question is that why should network admnistratoe do it in this maneer A to give access sw1 host to acess internet B to prevent sw1 host from acessing comand promt c to prevent sw2 host from accessing console of router ra D to give sw2 host access to the enternet e prevent sw1 host from accessing internet f to prevent sw1 host from acessing the sw2 host network isp------(s0/1)..RA..(fa1/1)---SW2-host (4,5,6) | | (sw1)------host 1,2,3 this is not exect digarm but help to derive the diagram plz answer as soon as possible
When using RIP, routing updates are broadcast every ____ seconds. A. 30 B. 10 C. 60 D. 90
Which ISDN protocol prefix specifies switching and signaling? A.) I B.) E C.) Q D.) S
What is the different between console port and auxiliary port?
what does PPTP use for encryption and authentication?
Identify the 2 characteristics regarding MAC addresses? A.) Contains a network portion and host portion B.) Always assigned by System Administrator C.) 48 bits long D.) Contains a vendor code and serial number
When we use extended access-list?
Hi Gyes, here is new question. can you provide answer of following question Like linux, can we windows as router? If yes how can we able to do this,