which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

Write an access list line which will deny node 20.0.2.1 to anywhere on your network using DNS via UDP. Don't worry about the other access list lines.

2 Answers  


friends i have some problem in the acess list plz help me out. purbi sinha. 1 what is the diffrence b/w inbound and out bound access list 2 what is main diffrence betwwen standred acesslist and extended access list 3 where should i keep stnadred access list and exatended access list i mean at which interface and why? 4 why wild card masking is used 5 what is switch febric in switching plz help me out i am litle bit confuse

1 Answers  


Identify 3 features of IGRP? A.) Composite metric B.) New horizon C.) Flash (triggered) updates D.) 60-second periodic updates E.) Poison reverse

1 Answers  


When we use router?

0 Answers  


Identify 3 IP applications? A.) AURP B.) ARP C.) Telnet D.) SMTP E.) DNS F.) RARP

2 Answers  


Classful routing protocols do not include subnet masks in their routing updates. Which of the following routing protocols are considered classful? A.) EIGRP B.) OSPF C.) TCP D.) IGRP E.) RIP F.) IP

2 Answers  


Explain how an spf algorithm works?

0 Answers  


How do areas benefit a link state inter network?

0 Answers  


In order to configure a Frame Relay subinterface with IP identify the 2 commands that must be configured on the physical interface? A.) Router(config-if)# encapsulation frame-relay B.) Router(config-if)# no ip address C.) Router(config-if)#encapsulation subinterface frame-relay D.) Router(config)# subinterface s0 encapsulation frame-relay

1 Answers  


Which layer defines the physical topology? A.) Application B.) Transport C.) Network D.) Data Link E.) Physical F.) Session

1 Answers  


Can you explain IKE phases? Can you explain IKE modes?

1 Answers   CCIE,


What are the types of communication in ipv6 ?

0 Answers  


Categories