Can you explain IKE phases? Can you explain IKE modes?
Answer / sami
There are Two Phases in IKE with 3 Phases.
phase 1 - isakmp sa will be created
phase 2 - ipsec sa to be created
Is This Answer Correct ? | 0 Yes | 0 No |
UDP works at which layer of the DOD model? A.) Internet B.) Host-to-Host C.) Transport D.) Data Link
Which IP address and wildcard mask would you use in your ACL to block all the hosts in the subnet 192.168.16.43/28?
Which information must a router know in order to perform proper and pungent routing? A. destination application of an incoming packet B. number of other packets in a single flow of data C. destination network address of an incoming packet D. number of routers that also know a path to the destination
how will configure Nat
Identify 1 characteristic of RARP? A.) MAC to IP address translation B.) Connectionless delivery of packets C.) Can be used to initiate remote O/S load sequence D.) Generates error and control messages
What causes a triggered update to reset the router hold-down timer?
what is the distance betwwen link stae routing protocl and distance vector who have the best convergence toplogy eigrp conatain 3 table name them what the toplogy table contain
What is a Frame Relay?
Your network uses a Class C address of 210.10.10.0. You must now split up the network into separate shores to handle multiple buildings separated by routers. Which two steps must you take to determine the proper shored mask for your networks? (Choose two) A. determine the number of seperate networks required B. determine how many devices will require DHCP addressing C. determine the maximum number of hosts that will be on each shored D. determine the miniumum number of hosts that will be on each shored E. determine which router will be the IP default gateway for each shored
Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity
What is wide-mouth frog?
Mention the ranges for the private IP?