Can you explain the basic of encryption in VPN?
No Answer is Posted For this Question
Be the First to Post Answer
Identify the command that saves the configuration stored in RAM to NVRAM? A.) copy running-config startup-config B.) copy tftp running-config C.) copy startup running D.) copy active to backup
please name some routed protocol.
5. What is an advantage of using routers in your network? (Choose all that apply) A. Stops broadcast storms B. Reduces downtime on your network C. Creates internetworks D. Can filter by logical address
What must be true for two routers running IGRP to communicate their routes? A.) Same autonomous system number B.) Connected using Ethernet only C.) Use composite metric D.) Configured for PPP
What's the default CDP holdtime in seconds for Cisco routers? A.) 30 seconds B.) 180 seconds C.) 90 seconds D.) 60 seconds
You need to come up with a TCP/IP addressing scheme for your company. Which two factors must you consider when you define the subnet mask for the network? A.) The location of DHCP servers B.) The volume of traffic on each subnet C.) The number of subnets on the network D.) The location of the default gateway E.) The number of host IDs on each subnet
In version 11.2 of the IOS, a Cisco router configured for frame-relay can automatically detect the LMI type. What is this known as? A.) Psychic B.) ESP C.) Inverse ARP D.) Hello E.) Reverse ARP F.) Autosense
Explain the difference between arp and rarp?
At what layer of the OSI reference model does FRAME-RELAY map to? A.) Session B.) Physical C.) Network D.) Presentation E.) Transport F.) Datalink
What is an advantage of UDP? Low Overhead High Overhead Reliable Not reliable
Which command will enable debugging for IPX RIP updates? A.) debug ipx B.) debug ipx rip C.) debug ipx rip activity D.) debug rip E.) debug ipx packets
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet