Cisco routers can secure the enable password with a one-way hash
algorithm. What command would encrypt the enable password
with the
strong encryption method?
A.) enable encrypt john
B.) password john
C.) enable secret john
D.) enable password john
E.) secret john
F.) enable password 5 john
Which of the following are examples of the Transport Layer? A.) Token Ring B.) UDP C.) TCP D.) IP E.) SQL F.) LLC
Which of the following are characteristics of UDP? A.) UDP is connection oriented. B.) UDP is used with TFTP. C.) UDP is unreliable. D.) UDP is connectionless. E.) UDP is at the transport layer. F.) UDP uses no acknowledgements.
what are loops in switches excactly...and how does it gets created???
how to troubleshoot when protocols is down and link is not getting up
What are four ways that Fast Ethernet compares to 10BaseT Ethernet? (Choose four) A. Fast Ethernet uses the same Maximum Transmission Unit (MTU) B. Fast Ethernet is based on an extension to the IEEE 802.3 specification C. Fast Ethernet uses the same Media Access Control (MAC) mechanisms D. Fast Ethernet preserves the frame format that is used by 10BaseT Ethernet E. Fast Ethernet errors a speed increase one hundred times that of the 10BaseT Ethernet
Hi, Shahin Thanks a lot for providing me these sites. These links are really helpful for me. r u working somewhere please let me know
how we can creat VPN..??? how it can be configured on cisco switches..??? can we creat VPN on different networks..??? why we need to create VPN..??? kindly write complete activity of commands to configure a VPN on switch..??? me specially looking towards Jatendra and Shahin
Which protocol can do load balancing on unequal cost also?
what is frame relay?
Identify the access-list range for an extended IP access-list? A.) 800 - 899 B.) 1 - 99 C.) 1000 - 1099 D.) 100 - 199
What are partial updates?
Which ipsec rule is used for the olympia branch and what does it define?