Cisco routers can secure the enable password with a one-way hash
algorithm. What command would encrypt the enable password
with the
strong encryption method?
A.) enable encrypt john
B.) password john
C.) enable secret john
D.) enable password john
E.) secret john
F.) enable password 5 john
Which layer manages protocol access to the Network layer? A.) Datalink - MAC Sublayer B.) Datalink - LLC Sublayer C.) Transport D.) Session E.) Network
What is subnet? Why is it used?
IP extended access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) all of the above C.) protocol D.) source address E.) port
IP extended access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) all of the above C.) protocol D.) source address E.) port
Which ISDN protocol prefix specifies switching and signalling? A.) I B.) E C.) Q D.) S
Can anyone explain the STP Security features. Just like BPDU guard, Root Guard. Hi JITENDERA, i m specially looking for u?????
As the system administrator, you type "ppp authentication chap pap secret". Which authentication method is used first in setting up a session? A. secret B. PAP C. CHAP D. PPP/SLIP
In IOS boot sequence if the flash is erased, and there is no access to TFTP server, and we can't load the partial IOS from ROM. Is there any possiblity that we can still boot the router/switch from external PC in which the IOS is installed?
Identify the purpose of the following command 'ip route 192.168.100.0 255.255.255.0 10.1.0.1' A.) Enabling a dynamic routing protocol B.) Creating a static route to the 10.1.0.0 network C.) Teaches the router about the distant network 192.168.100.0 and how it can be reached via 10.1.0.1 D.) Assigning the IP address 192.168.100.0 to an interface
hello friends im murtaza frm indore... and my question is that im doing hardware engenering and networking and im intrested in make a good career in networking so can you suggest.. which institiue is good for me...plzzz replyy im waiting...
Which of the following can reply to a Novell Get Nearest Server (GNS) request? A.) Local Novell server B.) Remote Novell Printer C.) Cisco router D.) Novell client
Which fields of an IP packet provide for fragmentation of datagrams to allow differing MTUs in the internet? A. Identification B. Flags C. Frag Offset D. Type of Service E. Total Length