Why do you use ‘service password encryption’?
No Answer is Posted For this Question
Be the First to Post Answer
mention the funtions about connection oriented and connectionless protocol and how it works ?
What type of frame does CDP use to gather information about it's neighbors? A.) TCP/IP B.) Novell-ether C.) Subnetwork Access Protocol (SNAP) D.) Ethernet_II
Identify the 3 characteristics of IGRP? A.) Uses hop count as a metric B.) Supports multiple unequal paths C.) Administrative distance is 100 D.) Configured with an Autonomous system number E.) Link state
Select the most correct statement regarding client port address assignment. The client port always matches the destination port. To access a web page the client uses the source port of 80 and the destination port is dynamically selected. When a client requests a web page the destination port is 80 by default and the source port for the client is dynamically selected. The client source port is 1024 to get web pages and 1055 when retrieving ftp files.
What are the job opportunities i will get once i complete my CCNA certification.
b Which protocol for PPP LCP (Link Control Protocol) performs a challenge handshake? A. CHAP B. PAP C. UDP D. IPX
Does switch has the IP Address. If YES? How to find it?
Explain the difference between tftp and ftp application layer protocols?
hello friends im murtaza frm indore... and my question is that im doing hardware engenering and networking and im intrested in make a good career in networking so can you suggest.. which institiue is good for me...plzzz replyy im waiting...
how to shutdown a Cisco router from command prompt?
11 Answers Atlas Systems, HCL,
Identify the 3 characteristics of IPX RIP? A.) Distance vector B.) Does not support multiple paths C.) 60 second updates D.) Default encapsulation is SAP E.) Uses ticks and hop count as a metric
The -- terminal no editing -- command will perform what function? A.) Edit the contents of NVRAM B.) Allows access to the terminal port C.) Stops the advanced editing feature D.) Enable password functions