Which ipsec rule is used for the olympia branch and what does it define? (Choose two)


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

Tell me why we use filter option?

0 Answers  


Which type of switching reads in the entire frame before forwarding it? A.) Tabling B.) Store-and-Forward C.) Inverse ARP D.) Fast Forward E.) Cut-Through F.) Routing

1 Answers  


What do the following commands accomplish? access-list 1 permit 172.16.0.0 0.0.255.255 interface ethernet 0 IP access-group 1 out interface ethernet 1 IP access-group 1 out A. Only traffic from the source network 172.16.0.0 will be blocked. B. Only traffic from the source network 172.16.0.0 will be forwarded. Non-172.16.0.0 network traffic is blocked. C. Non-172.16.0.0 traffic will be forwarded. D. All traffic will be forwarded.

1 Answers  


When a router knows the IP address, but does not know the MAC address of the device it wishes to contact, it uses the ARP (Address resolution protocol) to determine the MAC address. After it learns the MAC address, it stores this information in the ARP cache. What is the command to view the ARP cache? A.) sh mac B.) show cache C.) show arp D.) sh arp interfaces E.) show ip cache

2 Answers  


Why Clock rate command is not configured on ethernet interface of a router?

6 Answers  






Explain protocol?

0 Answers  


In Novell's use of RIP, there are two metrics used to make routing decisions. Select the two metrics. A. Ticks. B. Hops C. Loops D. Counts

3 Answers  


Name the command we give on privilege mode for coming back to user execution mode?

0 Answers  


FastEthernet compares to 10baseT Ethernet in which of the following ways

1 Answers  


What is the default bandwidth size of t1 routers?

0 Answers  


Which technologies listed below help prevent network loops in a switched (bridged) environment? A.) Store-and-Forward B.) IEEE 802.1d C.) Diikjstra Algorithm D.) Cut-Through E.) Spanning Tree Protocol F.) Routing

1 Answers  


Identify the purpose of the TCP 3 step handshake? A.) Setup a un-reliable connection B.) Initialize routing tables C.) Synchronize sequence numbers between hosts D.) Connection tear down process

1 Answers  


Categories