which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?
What we called 64 bit mac-address in ipv6?
Based on the DR AND BDR discussion i want to put one question the question is what is the name of protocol which is responsible;e for DR and BDR selection
Of the following switching types, which one has the lowest latency? A.) Cut-through B.) Fragment Free C.) None D.) Store-and-forward
IP standard access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) port C.) protocol D.) source address
Tell me CCNA Course + Dump Q/A in chennai?
Which layer called error detection layer?
If line down and protocol also down; in this case which layer move problem?
Identify the command that configures serial0 for PPP encapsulation? A.) Router(config)# encapsulation ppp B.) Router(config-if)# encapsulation serial ppp C.) Router(config-if)# encapsulation ppp D.) Router# encapsulation ppp
Which protocols are link states?
what is the difference between eigrp and ospf
You need to come up with a TCP/IP addressing scheme for your company. How many network IDs must you allow for when you define the subnet mask for the network? A.) One for each WAN link B.) One for each router interface C.) One for each NIC installed in each client D.) One for each subnet with hosts E.) One for each host ID
Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list