which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?
Write an access list line which will deny node 20.0.2.1 to anywhere on your network using DNS via UDP. Don't worry about the other access list lines.
friends i have some problem in the acess list plz help me out. purbi sinha. 1 what is the diffrence b/w inbound and out bound access list 2 what is main diffrence betwwen standred acesslist and extended access list 3 where should i keep stnadred access list and exatended access list i mean at which interface and why? 4 why wild card masking is used 5 what is switch febric in switching plz help me out i am litle bit confuse
Identify 3 features of IGRP? A.) Composite metric B.) New horizon C.) Flash (triggered) updates D.) 60-second periodic updates E.) Poison reverse
When we use router?
Identify 3 IP applications? A.) AURP B.) ARP C.) Telnet D.) SMTP E.) DNS F.) RARP
Classful routing protocols do not include subnet masks in their routing updates. Which of the following routing protocols are considered classful? A.) EIGRP B.) OSPF C.) TCP D.) IGRP E.) RIP F.) IP
Explain how an spf algorithm works?
How do areas benefit a link state inter network?
In order to configure a Frame Relay subinterface with IP identify the 2 commands that must be configured on the physical interface? A.) Router(config-if)# encapsulation frame-relay B.) Router(config-if)# no ip address C.) Router(config-if)#encapsulation subinterface frame-relay D.) Router(config)# subinterface s0 encapsulation frame-relay
Which layer defines the physical topology? A.) Application B.) Transport C.) Network D.) Data Link E.) Physical F.) Session
Can you explain IKE phases? Can you explain IKE modes?
What are the types of communication in ipv6 ?