Can you explain IKE (Internet Key Exchange)?
Answer / sami
IKE - Internet Key Exchange - negotiates security parameters
and authentication keys and handle the exchange of public keys
and manage the keys afterwords.
its a combination of 3 protocols
skeme - enables public key encryption for authentication
isaskmp - which defines how messages will be exchanged
oakley - which defines the mechanism for key exchanges
| Is This Answer Correct ? | 1 Yes | 1 No |
6. Which device can create smaller networks and stop broadcast storms by default? A. Repeater B. Bridge C. Router D. Gateway
A traffic light is an example of what type of mechanism? A.) Collision detection B.) Flow control C.) Sequence numbering D.) Network management
Identify the 3 characteristics of IPX RIP? A.) Distance vector B.) Does not support multiple paths C.) 60 second updates D.) Default encapsulation is SAP E.) Uses ticks and hop count as a metric
What are the generic parts of a network layer address? A. an intenetworks number and a URL B. a vendor code and a serial number C. a network number and a host number D. a broadcast number and a unicast number E. a domain identifier and a device identifier
What is EIGRP?
Name which protocols are link states?
What does a router change in a packet when it forwards a packet to the next hop? * A: Destination physical address * B: Destination network address * C: Destination network address and the destination physical address
Which command will display the encapsulation type on interface serial 0? A.) show interface s0 B.) show all C.) show int s0 encap D.) show encap s0 E.) show encap
Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed
Explain dhcp scope?
Which address or number is used to pass the data to the correct application? MAC Number IP address Port Number Segment Number
How many access lists are allowed per interface? A. One per port, per protocol B. Two per port, per protocol C. Unlimited D. Router interface +1 per port.