What are the different ways authentication mechanism in VPN?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

Identify 2 functions of IPX access-lists? A.) Control SAP traffic B.) Limit number of Novell servers on a network C.) Limit number of workstations on a network D.) Block IPX traffic

1 Answers  


Inverse ARP serves what purpose? A.) Method for a local router to introduce itself to the remote end of the connection B.) Broadcast a routing table update C.) Identify MAC addresses if the IP address is known D.) Sent every 10 seconds used to verify the Frame Switch is still active

1 Answers  


What are the two most common transport layer protocols? UDP TCP IPX ARP

3 Answers  


Routers can learn about destinations through static routes, default, or dynamic routing. By default, a router will use information derived from __________. A. IGRP B. RIP C. IP D. TCP

2 Answers   pspl,


What is the result of using a hierarchical addressing framework? A. increased availability of addresses B. decreased distance between routers C. increased router memory requirements D. no need to maintain routing information

1 Answers  






What is a benefit of a virtual LAN (VLAN)? A. It increases the number of broadcast domains B. It decreases the number of broadcast domains C. It increases the numberr of collision domains D. It decreases the number of collision domains E. Since it is a vitual Interface it never shuts down

4 Answers   jetking,


Which technologies listed below help prevent network loops in a switched (bridged) environment? A.) Store-and-Forward B.) IEEE 802.1d C.) Diikjstra Algorithm D.) Cut-Through E.) Spanning Tree Protocol F.) Routing

1 Answers  


HOW MPLS IS DIFFERENT FROM OSPF? WHY NOW A DAYS MPLS IS PREFERED OVER ANY NETWORK PROTOCOL?

1 Answers   Bank Of India, TCS,


An autonomous system can only exist if all routers in that system meet which criteria? A. interconnected B. run the same routing protocol C. assigned same autonomous system number D. run IGRP only E. run RIP only

1 Answers  


Which statement about Ethernet switches is true? A. Symmetric switching allows connection between pods of unlike bandwidth and does not require memory buffering B. Memory Buffering is used to prevent a bottleneck when pods of different bandwidth are connected on a symmetric switch C. The latency can be reduced if the switch utilizes the store and forward method of switching store and forward is better for error detection D. The cut through method of switching is faster because the switch forwards the packet to the destination as soon as it reads the destination address

1 Answers  


Suppose a USER is saying he is not able to access the internet or page loading is slow what trobleshooting steps you will take to get it fixed

5 Answers   Infosys,


The administrator of a comapny needs to ensure that a web server in their network is accessible from the Internet. Since the network uses private addressing, this requires an IP-to-registered-address mapping. The following command is entered on the router: router(config)# ip nat inside source static 192.168.2.1 198.18.1.254 After unsuccessful results from a ping to the Internet, the administrator issues the show ip nat translations command and the output is blank. What could be the problem with the NAT configuration for this mapping? A. The keyword overload is missing from the command. B. The administrator needs to define a NAT pool first. C. An access list must be defined to create static NAT translations. D. The interfaces need to be configured for NAT.

4 Answers  


Categories