Which layer is responsible for negotiating data transfer syntax?
A.) Network
B.) Session
C.) Application
D.) Transport
E.) Presentation
Answers were Sorted based on User's Feedback
What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.
How do we do encryption and authentication in L2F?
as i m cccna holder ... then why i m going for bpo's ?
10.1.1.0 n/w advertised as /16 from EIGRP & /24 from OSPF which will come in routing table & why
Identify the default encapsulation on serial interfaces? A.) ISDN B.) HDLC C.) SDLC D.) Frame Relay E.) PPP
What is the command to copy the IOS image to a TFTP server? A.) copy flash tftp B.) copy running-config tftp C.) copy ios tftp D.) copy startup-config tftp
which points are eliminated by the DBSCAN algorithm?
What is the difference among straight cable, cross cable and rollover cable?
Explain the types of ethernet?
Given the IPX address 4a.0002.1111.a999, what is the network ID and what is the node ID? A.) net 4a host 0002.1111.a999 B.) net a999 node 0002.1111 C.) net 0002.1111.a999 node 4a D.) net 0002.1111 node a999
what is full form of rst,smtps & http?
Which command we use for ping in ipv6?