which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

What we called 64 bit mac-address in ipv6?

0 Answers  


Based on the DR AND BDR discussion i want to put one question the question is what is the name of protocol which is responsible;e for DR and BDR selection

7 Answers   Patni,


Of the following switching types, which one has the lowest latency? A.) Cut-through B.) Fragment Free C.) None D.) Store-and-forward

1 Answers  


IP standard access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) port C.) protocol D.) source address

2 Answers  


Tell me CCNA Course + Dump Q/A in chennai?

2 Answers   Microsoft, Wipro,


Which layer called error detection layer?

0 Answers  


If line down and protocol also down; in this case which layer move problem?

0 Answers  


Identify the command that configures serial0 for PPP encapsulation? A.) Router(config)# encapsulation ppp B.) Router(config-if)# encapsulation serial ppp C.) Router(config-if)# encapsulation ppp D.) Router# encapsulation ppp

1 Answers  


Which protocols are link states?

0 Answers  


what is the difference between eigrp and ospf

6 Answers   IBM, Wipro,


You need to come up with a TCP/IP addressing scheme for your company. How many network IDs must you allow for when you define the subnet mask for the network? A.) One for each WAN link B.) One for each router interface C.) One for each NIC installed in each client D.) One for each subnet with hosts E.) One for each host ID

1 Answers  


Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list

1 Answers  


Categories