Can you give an overview of various components in IPSec?
No Answer is Posted For this Question
Be the First to Post Answer
On which bas ospf take decision?
Which mode called privilege mode?
What is a characteristic of Store and Forward switches? A.) They forward the frame before it is completely read. B.) They work at wire speed. C.) They are the same a Cut-Through switching. D.) They read the entire frame and check CRC before forwarding. E.) They decrease latency.
Which of the following protocols are used for logical network addressing? A.) IP B.) TCP C.) ARP D.) ICMP E.) RARP F.) BootP
How does inter- VLAN communication take place? A. It takes place through any Cisco router B. It takes place through a Cisco router that can run ISL C. It takes place through a router but this disables all the router a security and filtering functionality for the VLANS D. For nonroutable protocals (e.g. NetBeui) the router provides communications between VLAN domains E. Inter-VLAN communication is not possible because each VLAN is a separate broadcast domain
HI ALL! RECENTLY I COMPLETED MY MCITP, CCNA COURSE, I AM PLANNING TO DO CCNA CERTIFICATION, ANYBODY PLZ SUGGEST ME HOW MUCH TIME (MONTHS) REQUIRED TO PREPARE FOR CCNA, BOOKS, JOB SCOPE IN INDIA, QUALIFICATION REQUIRED, ANY JOB FOR FRESHERS? YOUR GOOD ADVISE IS HIGHLY APPRECIATED. Reg.Khaleel
Mention what does the clock rate do?
Which of the following are used by routers to learn routes to be added to the routing table? Ping and Traceroute MAC address resolution Acknowledgments and Sequence Numbers Routing updates and static routes
How many ports are present in a router?
How does a switch use store and forward? A.) By using a Class I repeater in a collision domain B.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface C.) By using broadcast addresses as source addresses D.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets
Why we using Tcp/IP. Why we can't use just Tcp ip? What is the meaning of '/' symbol in between this?
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet