Can you explain what IPSec is
Answers were Sorted based on User's Feedback
Answer / hema
IPSec gives secure data transmission between two communicating devices
| Is This Answer Correct ? | 6 Yes | 0 No |
Answer / mahmood
ipsec is a suite of protocols which ensure the following:
1-confidentiality of data
2-integrity of data
3-anti-replay of data
4-non-repudiation
contains the main cryptographic algorithms used in securing traffic between two networks over an un trusted network, given that IKE phase 1 is enabled.
| Is This Answer Correct ? | 1 Yes | 0 No |
What is the difference between named and extended acl?
Which command will copy the routers configuration from NVRAM to a Network file server? A.) copy start tftp B.) copy start tftp server C.) copy tftp startup-config D.) copy running-config tftp E.) copy startup-config tftp
Which table find best path?
Which command verifies encapsulation as well as Layer 1 and Layer 2 statistics on a router configured for Frame Relay? A. show ip B. show interface C. show statistics D. show frame-relay
What is the command to manually enter a static route? A.) IP route network B.) IP route C.) IP route < destination network> D.) IP route
What is a characteristic of Store and Forward switches? A.) They work at wire speed. B.) They are the same as Cut-Through switching in 'prune' mode. C.) They forward based on transport layer info. D.) They forward the frame before it is completely read. E.) They increase latency.
what is the diffrence betwwen telnet and ssh.this question is asked by nikhil and i am plasing the answer here insteed of his personal mail.
Which is not a common problem with Distance-Vector routing? A.) Slow convergence. B.) Complex configuration. C.) Routing loops. D.) Periodic updates can slow convergence. E.) Counting to infinity.
What is the draw back of ospf protocol?
Which three basic switch functions increase available bandwidth on the networks? (Choose three) A. loop avoidance B. address learning C. hop count limiting D. broadcast filtering E. packet forward/filtering F. broadcast packet hop count learning/forward/filtering
Which network mask should you place on a Class C address to accommodate a user requirement of two subnetworks with a maxximum of 35 hosts on each networks A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248
Describe End to End network services: (Choose all that apply) A.) Best Route selection B.) Accomplished Segment by Segment, each segment is autonomous C.) Flow Control & Data Integrity D.) Best efforts packet delivery