what does PPTP use for encryption and authentication?
No Answer is Posted For this Question
Be the First to Post Answer
How many subnets can be gained by subnetting 172.17.32.0/23 into a /27 mask, and how many usable host addresses will there be per subnet?
If you are running Token Ring with Novell IPX routing, which encapsulation should you use? A.) SAP B.) SNAP C.) 802.5 D.) 802.2
Tell us the name of algorithm of eigrp protocol?
What is the result of segmenting a network with a router into segments 1 and 2? A. It increases the number of collisions B. It decreases the number of broadcast domains C. It connects segment 1 and broadcasts to segment 2 D. It connects segment 1 and broadcasts from genre to segment 2
What are three benefits of Integrated Services Digital Network (ISDN) (Choose three) A. PVCs are faster and more reliable B. No specialized equipment is required C. Data transfer is faster than typical modems D. Call setup is faster than with standard telephone service E. It carries many types of data tramp such as voice video and data
Which command displays the IP addresses assigned to specific host names? A. show hosts B. show interface C. ping host name D. config host name E. show host mapping F. show host ip address G. trace ip addresses host name H. a partridge in a pear tree
What is ping? What is the usage of ping?
What’s the default CDP holdtime in seconds for Cisco routers?
What is overlaod?
hello i am new to this, i need to know how will i complete a basic scenario that ask the required number of networks that is 80 and the minimum number of host that is 3000 and the network address is 10.0.0.0 and i need to need how to compute to get the answer on what is the subnet mask.
Identify the effect of Ctrl-Z? A.) Exits back to privileged exec mode B.) Disconnect from the router C.) Abort the ping operation D.) Exits privileged exec mode
How network gateway is different from routers?