Can you describe the Authentication Header (AH) Protocol?
No Answer is Posted For this Question
Be the First to Post Answer
What is ping? What is the usage of ping?
Why we used Virtual MAC in GLBP
Identify the default values that make up IGRP's composite metric? A.) Bandwidth B.) Load C.) Reliability D.) MTU E.) Delay
Which command we give for see routing table?
Which command line statement determines the number of seconds a dialup connection can wait without any traffic before the router hangs up? A.) dialler max-time B.) dialler timeout C.) dialer idle-timeout D.) dialer hang-up E.) disconnect-timer
If a frame is received at a switch and only the destination hardware address is read before the frame is forwarded, what type of switching method is this? A.) Store-and-drop B.) Latency C.) Store-and-forward D.) Cut-through
What field tells the Internet layer how to handle an IP packet? A. Type of Service B. Identification C. Flags D. Frag Offset
what hapeen we we configure default root on the router which is conected by isp supoese there are two router r1 is conected throug isp and and by s0 r1 is conexted to r2 if we apply degault root on r1 what will happen
what's the difference between Symmetric and Asymmetric cryptosystem?
WHY DO WE USE the command interface Vlan 1 ip adress x.x.x.x sub mask what does it do .. what does it create.. i know when we create it we can remotely telnet inti a router=switch. but what is the diff bwt vlan and intface vlan. ... vlan 1 bieng a native vlan remains there eve if i dont gv switch an ip address .. lease suggest.
How IEEE Calculate the Cost of Link (ex.. 10mbps is having Cost 100) Is there any formula or any test to calculate it.
In which protocol supenetting is enable by default?