How do we do encryption and authentication in L2F?
No Answer is Posted For this Question
Be the First to Post Answer
which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?
Which command verifies encapsulation as well as Layer 1 and Layer 2 statistics on a router configured for Frame Relay? A. show ip B. show interface C. show statistics D. show frame-relay
After the command -- router igrp 200 -- what command would enable IGRP on the router for interface E0, with an address of 157.89.4.4 and a mask of 255.255.255.0 ? A.) network 157.89.4.0 255.255.255.1 B.) network 157.89.0.0 C.) router igrp * D.) router igrp 157.89.0.1 E.) router igrp int e1 F.) router igrp 157.89.4.1
What command do you use to disable domain lookup? A.) no domain-lookup B.) domain no-lookup C.) lookup no-domain D.) no ip domain-lookup
Which cable called v.35?
What two types of PPP data compression are available using Cisco IOS? A.) Predictor B.) DoubleSpace C.) Stacker D.) PAP E.) ZIP F.) CHAP
When we use extended access-list?
What is VLSM ?
Identify the 2 commands to copy a configuration from a TFTP server to RAM? A.) configure network B.) configure overwrite C.) copy backup-config running-config D.) copy tftp running-config
Which statement about Ethernet switches is true? A. Symmetric switching allows connection between pods of unlike bandwidth and does not require memory buffering B. Memory Buffering is used to prevent a bottleneck when pods of different bandwidth are connected on a symmetric switch C. The latency can be reduced if the switch utilizes the store and forward method of switching store and forward is better for error detection D. The cut through method of switching is faster because the switch forwards the packet to the destination as soon as it reads the destination address
Explain how many maximum paths you can give on latest ios in rip?
What are the types of communication in ipv6 ?