What are the different ways authentication mechanism in VPN?
No Answer is Posted For this Question
Be the First to Post Answer
Which layer is responsible for negotiating data transfer syntax? A.) Network B.) Session C.) Application D.) Transport E.) Presentation
which layer is responsible for flow control with sliding windows and reliability with sequence number and acknowledgement? A)Transport. B)Application C) Internet D)Network Interface
what is telnet,ssh?? what is the perpose of this? wer r this configured and how to configured??
what is native vlan any one explain sooraj
Which two statements about a bridge are true? (Choose two) A. A bridge floods multicasts B. A bridge floods broadcasts C. A bridge does not flood multicasts D. A bridge does not flood broadcasts
Identify the 3 characteristics of IGRP? A.) Uses hop count as a metric B.) Supports multiple unequal paths C.) Administrative distance is 100 D.) Configured with an Autonomous system number E.) Link state
There are 2 types of PPP authentication supported by the Cisco IOS. What are they? A.) PAP B.) PREDICTOR C.) MD5 D.) CHAP E.) STACKER F.) MSCHAP
Identify the administrative distance and appropriate routing protocol? A.) RIP = 255, IGRP = 100 B.) RIP = 100, IGRP = 120 C.) RIP = 1, IGRP = 0 D.) RIP = 120, IGRP = 100
What is the protocol and what is the second part of the following network address? 172.16.0.254 mask - 255.255.0.0 A. IPX MAC address B. IP Class C directed broadcast C. Private IP address node number D. Public IP directed broadcast E. Private IP directed broadcast
In regards to TCP/IP, which class of address allows for the fewest valid Internet hosts? A.) D B.) E C.) Classes are not used in TCP/IP. D.) B E.) C F.) A
Routers can learn about destinations through static routes, default, or dynamic routing. By default, a router will use information derived from __________. A. IGRP B. RIP C. IP D. TCP
What does the following line for an access list do? 'access-list 101 deny tcp 3.4.5.0 0.0.0.255 any eq 23' A.) deny all ftp traffic B.) deny all ftp traffic from subnet 3.4.5.0 C.) deny all telnet traffic from subnet 3.4.5.0 D.) deny all ftp traffic to subnet 3.4.5.0 E.) deny all telnet traffic