IP extended access lists use which of the following as a
basis for
permitting or denying packets?
A.) destination address
B.) all of the above
C.) protocol
D.) source address
E.) port
Answer / guest
Answer: B
All of the above are basis for permitting or denying IP
packets for use
with an Extended IP access list.
| Is This Answer Correct ? | 2 Yes | 0 No |
A company running RIP V1 protocol on their 2 seperate networks, each nw has 14 routers, if the two nw wants to be merged with each other total no of routers will be 28. but rip metric is hop count(15). What needs to be done if this setup needs to be work ?
What are the disadvantages of symmetric algorithms?
When we use loop back ip?
How is rip different from igrp?
Which layer is responsible for flow control, acknowledgement, and windowing? A.) Transport B.) Network C.) Application D.) Session E.) Physical F.) Data Link
Which peer authentication method and which ipsec mode is used to connect to the branch locations?
What is the protocol number for UDP? A.) 6 B.) 17 C.) 25 D.) 21
ccna syallabus and what is the mean by troubble shooting
What key do you use to view the last command? A.) Ctrl+X B.) Ctrl+Z C.) Ctrl+E D.) Ctrl+P
Which of these is the Private key? A. Bear B. Cave C. Indian D. Cowboy
Define the logical link control?
switch kitne volt per work karta hai. what is frame realy. what is isdn and pri and bri.