Why do you use ‘service password encryption’?
From Enable mode, a user types the letter 'C' and presses enter. There is more than 1 command that starts with 'C'. What message would the router return? A.) Nothing would be returned, the command is simply ignored. B.) unknown command C.) ambiguous command. D.) Copy to? E.) Configured console from console.
What will transport layer do when data coming from session layer. They asked about intial operation(3 - way handshake)
Identify 3 feature of access-lists? A.) Implicit deny will deny any packets not matched B.) Processed sequentially from bottom to top C.) Processed sequentially from top to bottom D.) If a packet is denied it would be tested against the remaining statements in the access-list E.) Once a match is made the packet is either denied or permitted F.) Enabled on all interfaces by default
Can you explain PPTP (Point-to-Point Tunneling Protocol)?
Identify the command mode necessary to enter the standard ping command? A.) Router(config)# B.) Router> C.) Router(std-ping)# D.) Router(config-if)#
What do we check while configuring the server?
Which layer manages protocol access to the Network layer? A.) Datalink - MAC Sublayer B.) Datalink - LLC Sublayer C.) Transport D.) Session E.) Network
Mention what does data packets consist of?
What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS
Can anyone explain in details the STP port state?????
Which of the following do not belong to the customer? A.) CO B.) DCE C.) Router D.) CPE E.) Demarc F.) DTE
Which layer is responsible for coordinating communication between systems? A.) Application B.) Network C.) Session D.) Transport E.) Physical F.) Data Link