What are the different types of password used in securing a cisco router?
No Answer is Posted For this Question
Be the First to Post Answer
What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.
Which three are typical operational phases in a basic connection oriented network service? A. call setup B. data transfer C. load balancing D. call termination E. caller ID F. call prionflication G. data segmentation H. data and momma I. data link identification J. callering book
A router on one side of a PPP link uses the resonance RTR1 and the password COPP1-PWD. Which configuration line on RTR1 enables a connection between RTR1 and another router named RTR2? A. username, RTR2 password COPR1-PWD, B. username, RTR1 password COPR1-PWD, C. username, RTR2 password COPR2-PWD, D. username, RTR1 password COPR2-PWD,
What is the command for change serial cost?
What is the IP extended access list range? A.) 1000-1099 B.) 100-199 C.) 1-99 D.) 101-200
Identify the default values that make up IGRP's composite metric? A.) Bandwidth B.) Load C.) Reliability D.) MTU E.) Delay
Two of the protocols that can be carried in the Protocol field of an IP packet are? A. TCP B. UDP C. FTP D. TFTP
What is public and private ip address., explain? and also explain the ip address range of both public and private? and where we use that public and private ip address?
Which ISDN protocol prefix specifies switching and signaling? A.) I B.) E C.) Q D.) S
Which layer is responsible for providing mechanisms for multiplexing upper-layer application, session establishment, and tear down of virtual circuits? A.) Session B.) Network C.) Physical D.) Transport E.) Application F.) Presentation
A user device that connects to a DCE must be which of the following? A.) DTE B.) CPE C.) Demarc D.) DCE E.) CO
Which statement about switched and routed data flows is correct? A. Switches create a single collision domain and a single broadcast domain. Routers provide separate collision domains B. Switches create separate collision domains but a single broadcast domain. Routers provide a separate broadcast domain C. Switches create a single collision domain and separate broadcast domains. Routers provide a separate broadcast domain as well D. Switches create separate collision domains and separate broadcast domains. Routers provide separate collision domains