Can you explain IKE (Internet Key Exchange)?
Answer / sami
IKE - Internet Key Exchange - negotiates security parameters
and authentication keys and handle the exchange of public keys
and manage the keys afterwords.
its a combination of 3 protocols
skeme - enables public key encryption for authentication
isaskmp - which defines how messages will be exchanged
oakley - which defines the mechanism for key exchanges
| Is This Answer Correct ? | 1 Yes | 1 No |
what is the binary value of loop back address
What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer
Your Ethernet interface currently has the IP address of 1.1.1.1/24. You would like it to have a second IP address of 2.2.2.2/24. Which command will do that? A.) ip address 1.1.1.1 2.2.2.2 255.255.255.0 B.) ip address 2.2.2.2 255.255.255.0 secondary C.) ip address 2.2.2.2 255.255.255.0 D.) This cannot be done, you can only have 1 IP address per physical interface. E.) ip address 2.2.2.2 /24
Write the procedure for Router for configuring DHCP?
What are the IGRP stability features?
3 router configured with RIP & Ripv2 rotuer 1- connected with router 2 having sr ip 10.0.1.2 routing : ripv2 router 2: connected with router 1 and router 3 having sr 0 ip 10.0.1.3 & sr 1 ip 11.0.1.2 routing :rip & ripv2 router 3: connected with router 2 having sr ip 11.0.1.3 routing: rip is there communication possible btween these networks ? if yes how
What field tells the Internet layer how to handle an IP packet? A. Type of Service B. Identification C. Flags D. Frag Offset
Identify the access-list range for an extended IP access-list? A.) 800 - 899 B.) 1 - 99 C.) 1000 - 1099 D.) 100 - 199
What is ccna?
Which can be true regarding VLANs? A.) They are created by location B.) They are created by function C.) They are created by department D.) They are created by group
What is the first step in data encapsulation? A.) User information is converted into data. B.) Frames are put into bits. C.) Data is converted into segments. D.) Segments are converted into datagrams and packets. E.) Packets are put into logical frame.
How do you disable CDP on the entire Router? A.) Router#no cdp run B.) Rotuer(config-if)# no cdp enable C.) Router(config)# no cdp enable D.) Router(config)# no cdp run