which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

Which of the following would not be displayed by the command ?sho cdp neighbor detail?? A.) The incoming/outgoing interface. B.) The hardware platform. C.) One address per protocol. D.) Amount of Flash Memory Available E.) The routers hostname. F.) The subnet mask, if IP is configured.

1 Answers  


What is 10baset ethernet lans?

0 Answers  


A traffic light is an example of what type of mechanism? A.) Collision detection B.) Flow control C.) Sequence numbering D.) Network management

1 Answers  


Which ISDN specification series deals with Concepts and Terminology? A.) World Series B.) I- Series C.) Q-Series D.) 911-Series E.) J-Series F.) F-Series

1 Answers  


Explain the difference between routable and non- routable protocols?

0 Answers  






Which is true regarding half duplex Ethernet operation? A.) Half Duplex ethernet technology provides a transmit circuit connection wired directly to the receiver circuit at the other end B.) Half duplex transmission between stations is achieved by using point to multipoint Ethernet and Fast Ethernet C.) With Half Duplex transmission logically circuits feed into a single cable creating a situation similar to a one way bridge D.) Half Duplex transmission between stations is achieved using Point to Point Ethernet & Fast Ethernet

2 Answers  


Hi, I cannot download anything on my office pc. only because of that i want online practice sites. anyway thanks for providing me website

0 Answers  


Identify the command to configure the router to boot from an IOS located on a TFTP server? A.) boot system tftp IOS.exe 172.16.5.1 B.) boot system tftp 172.16.5.1 IOS.exe C.) boot system flash tftp 172.16.5.1 D.) boot system IOS.exe 172.16.5.1

1 Answers  


Identify 3 characteristics of switches? A.) Increase available bandwidth B.) Decrease broadcast traffic C.) Support full duplex in a multipoint topology D.) Make fowarding decision using MAC address E.) Create collision domains

1 Answers  


What do you use the Aux port for? A.) Console B.) Terminal editing C.) Modem D.) Backup logging

3 Answers  


An ISDN BRI circuit can be described as which of the following? A.) 3B channels B.) 2-64Kbps B channels and 1-16Kbps D channel C.) none of the above D.) 2-64Kbps B channels and 1-16Kbps C channel

1 Answers  


When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised

8 Answers   Wipro,


Categories