which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?
No Answer is Posted For this Question
Be the First to Post Answer
Which of the following would not be displayed by the command ?sho cdp neighbor detail?? A.) The incoming/outgoing interface. B.) The hardware platform. C.) One address per protocol. D.) Amount of Flash Memory Available E.) The routers hostname. F.) The subnet mask, if IP is configured.
What is 10baset ethernet lans?
A traffic light is an example of what type of mechanism? A.) Collision detection B.) Flow control C.) Sequence numbering D.) Network management
Which ISDN specification series deals with Concepts and Terminology? A.) World Series B.) I- Series C.) Q-Series D.) 911-Series E.) J-Series F.) F-Series
Explain the difference between routable and non- routable protocols?
Which is true regarding half duplex Ethernet operation? A.) Half Duplex ethernet technology provides a transmit circuit connection wired directly to the receiver circuit at the other end B.) Half duplex transmission between stations is achieved by using point to multipoint Ethernet and Fast Ethernet C.) With Half Duplex transmission logically circuits feed into a single cable creating a situation similar to a one way bridge D.) Half Duplex transmission between stations is achieved using Point to Point Ethernet & Fast Ethernet
Hi, I cannot download anything on my office pc. only because of that i want online practice sites. anyway thanks for providing me website
Identify the command to configure the router to boot from an IOS located on a TFTP server? A.) boot system tftp IOS.exe 172.16.5.1 B.) boot system tftp 172.16.5.1 IOS.exe C.) boot system flash tftp 172.16.5.1 D.) boot system IOS.exe 172.16.5.1
Identify 3 characteristics of switches? A.) Increase available bandwidth B.) Decrease broadcast traffic C.) Support full duplex in a multipoint topology D.) Make fowarding decision using MAC address E.) Create collision domains
What do you use the Aux port for? A.) Console B.) Terminal editing C.) Modem D.) Backup logging
An ISDN BRI circuit can be described as which of the following? A.) 3B channels B.) 2-64Kbps B channels and 1-16Kbps D channel C.) none of the above D.) 2-64Kbps B channels and 1-16Kbps C channel
When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised