What are the different types of passwords used in securing a CISCO router?
No Answer is Posted For this Question
Be the First to Post Answer
What is topology in ccna?
What do the following commands accomplish? access-list 1 deny 172.16.4.0 0.0.0.255 access-list 1 permit any interface ethernet 0 IP access-group 1 out A. This will block traffic from subnet 172.16.4.0 and allow all other traffic. B. This will allow traffic from subnet 172.16.4.0 and block all other traffic. C. All traffic is allowed. D. All traffic is blocked.
Given an IPX network with redundant paths, what command will configure load balancing? A.) ipx load-balance B.) ip maximum-paths 2 C.) ipx maximum-paths 2 D.) ipx load-share
What is Data, management, native, default,trunk and access vlan?
Which layer is responsible for routing through an internetwork? A.) Physical B.) Session C.) Network D.) Transport E.) Application F.) Data Link
Identify 2 features of PPP PAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) More secure than CHAP D.) Remote node is control of authentication process
Which port numbers are used by TCP and UDP to set up sessions with other hosts? A.) 1024 and above B.) 6 and 17 respectively C.) 1-25 D.) 6-17
In IOS boot sequence if the flash is erased, and there is no access to TFTP server, and we can't load the partial IOS from ROM. Is there any possiblity that we can still boot the router/switch from external PC in which the IOS is installed?
Which OSI layer end to end communication, segmentation and re-assembly? A.) Network B.) Transport C.) Physical D.) Application E.) Data-Link F.) Presentation
completly describe th steps fo osi model when you enter http:/youtube.com
What is the default CDP broadcast update rate for Cisco routers? A.) 120 seconds B.) 60 seconds C.) 30 seconds D.) 90 seconds
Explain dhcp scope?