What are the different types of passwords used in securing a CISCO router?
No Answer is Posted For this Question
Be the First to Post Answer
How can you assign a vlan to a switch port?
Can you explain IKE (Internet Key Exchange)?
Mention the conversion steps of data encapsulation?
1350 Value in which type of access-list?
in which way the datas will transfer from one host to another host by using osi layer?
How many LMI types are available on Cisco routers? A.) Four B.) Two C.) Five D.) Three
Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity
Can you describe the Authentication Header (AH) Protocol?
Which statement is true? A. While bridges are used to segment networks, they will not isolate broadcast or multicast packets. B. A bridge looks at every packet within its network segment and works like a hub re-broadcasting the packet if the destination is within its network segment. C. A bridge maintains a table of the IP addresses of the hosts within its network segment and forwards the packet directly to the destination based upon the IP address. D. A bridge resets the hop count by keeping all packets within the network segment. Only packets addressed to a specific destination host outside the network segment are allowed to pass through the bridge.
What do you mean by Port Mirroring?
Name the protocol which can do load balancing on unequal cost also?
Which layer is responsible for coordinating communication between systems? A.) Application B.) Network C.) Session D.) Transport E.) Physical F.) Data Link