which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?
No Answer is Posted For this Question
Be the First to Post Answer
Ping uses which Internet layer protocol? A.) RARP B.) ICMP C.) ARP D.) FTP
What does vlan provide?
Identify the default encapsulation on serial interfaces? A.) ISDN B.) HDLC C.) SDLC D.) Frame Relay E.) PPP
What is the default bandwidth of a serial connection? A.) 1200 baud B.) 1.544 Mbps (T1) C.) 10 Mbps D.) 96Kpbs
Explain the terms unicast, multicast, broadcast.
What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer
Explain the difference between rip and ripv2?
When you use the Cisco IOS command show configuration on a router which part of the output shows the specific conferred IP addresses and shored masks? A. the IP host table B. the interfaces output C. each section of the output D. the global configuration statements E. the section under the autonomous system number
What information can you get from CDP info: (choose all that apply) A.) Hardware platform B.) One address per protocol C.) Software platform D.) Hostname E.) The same info as show version F.) Incoming/outgoing port
Identify 3 characteristics of a MAC address? A.) Burned into the NIC B.) 48 bits long C.) Length is 32 bits D.) Used to deliver the frame to the end device E.) Contains a network portion and a host portion
The two sublayers of the IEEE Data Link Layer are which of the following? A.) Link and Logical Control B.) Data Link and LLC C.) Logical Link Control and Media Access Control D.) Data Link and MAC
What is the diiffernce between windows xp & windows 2000?
6 Answers TCS, Trimax, Trymax, VigaTech,