what is ESP (Encapsulating Security Payload)?
Answer / naushad
ESP is a kind of protocol which provides confidentiality, integrity, authentication and auto-replay. It is also a kind of mixed security for both IPv4 and IPv6.
| Is This Answer Correct ? | 2 Yes | 0 No |
Which of the following are valid Cisco encapsulation type names? A.) arpa = IPX Ethernet B.) novell-ether = IPX Ethernet_802.3 C.) snap = IEEE 802.2 SNAP on Ethernet, FDDI, and Token Ring D.) novell-fddi = IPX Fddi_Raw E.) sap = IEEE 802.2 on Ethernet, FDDI, and Token Ring F.) hdlc = HDLC on serial interfaces
What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer
What is the purpose of data link layer?
What command would show the version of the IOS that you are running? A.) show nvram B.) show version C.) show startup-config D.) show ios E.) ver -a F.) show ram
Define the logical link control?
The Cisco Catalyst 5000 switch supports full duplex. How would you enable it on the second port of the card in slot 1? A.) router(config-if)# duplex full B.) router(config)# duplex full C.) router(config-if)# set port duplex D.) router(config)#port duplex = full E.) router(config-if)# set port 1/2 full
Interface 0/0 what does it mean?
Identify 1 characteristic of RARP? A.) MAC to IP address translation B.) Connectionless delivery of packets C.) Can be used to initiate remote O/S load sequence D.) Generates error and control messages
What are characteristics of UDP A. It is reliable and acknowledged B. It is unreliable and acknowledged C. It is reliable and unacknowledged D. It is unreliable and unacknowledged
Tell me CCNA Course + Dump Q/A in chennai?
What is the UDP datagram format? A. Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data B. Destination Port - 16 bits, Source Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data C. Source Port - 16 bits, Destination Port - 16 bits, Checksum - 16 Bits, Length - 16 bits, Data D. Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data
Identify the type of routing protocol that maintains a topological database of the network? A.) Topological state B.) Shortest Path First C.) Link state D.) Distance vector