How do we do encryption and authentication in L2F?
No Answer is Posted For this Question
Be the First to Post Answer
hello i am new to this, i need to know how will i complete a basic scenario that ask the required number of networks that is 80 and the minimum number of host that is 3000 and the network address is 10.0.0.0 and i need to need how to compute to get the answer on what is the subnet mask.
What are the different ways authentication mechanism in VPN?
Which layer of the 7 layer model is responsible for representing the application information between 2 different OS's? For example, converting ASCII to EBCIDIC. A.) Transport B.) Application C.) Physical D.) Session E.) Presentation F.) Network
What does -1 signify in an extended IPX access list? A. permit this host B. deny this host C. permit only this subnet D. any host or any network
What is the network subnet?
There is a process in Frame-Relay where LMI resolves an IP address from a DLCI number. What is this called? A.) arp B.) inverse arp C.) rarp D.) automap E.) reverse arp F.) arp
When dr communicate with bdr which multicast ip it use?
let threr are three router 1 is cionected to two and two is conected to three that is 1----2----3 now we can ping 2 from 3 and 1 to two but we are not able to ping 1 to 3 let router 1 is local and rest of two are remote what should be urs troubleshoot steps
Tell me how much hold down time of eigrep protocol?
Which IP Address Class can have 64,000 subnets with 64,000 hosts per subnet? A. Class B B. Class A C. Class C D. Class D
Hi,can anyone explain me in brief about ccna security. waiting for your answer
How to crimping cat cable without using crimping and any tool...........?