What is the usage of service password encryption?
No Answer is Posted For this Question
Be the First to Post Answer
How does PPTP encapsulate data?
Identify the 2 commands the saves the running-config to NVRAM? A.) write memory B.) copy running-config startup-config C.) write network D.) write backup
Which three statements about common elements of the TCP/IP protocol stack are true? (Choose three) A. IP provides connectionless service and routing capabilities B. APP enables devices to locate the IP address of local devices C. UDP provides simple connectionless service without windowing or acknowledgments D. ICMP provides connection oriented management data to routers and Layer 3 switches E. TCP enables devices to send large quantities of data using windowing in a connection oriented manner
Identify the command to copy a configuration file from a TFTP server to a routers active configuration? A.) Router# copy running-config tftp B.) Router# copy tftp running-config C.) Router# copy tftp 172.16.0.1 running-config D.) Router(config)# copy tftp running-config
Identify the default values that make up IGRP's composite metric? A.) Bandwidth B.) Load C.) Reliability D.) MTU E.) Delay
what is the major difference between EIGRP & IGRP?
How many fillers we can put in one ip of ipv6?
We know that TCP provides connection oriented services, what else does it provide? A.) FECN & BECN B.) Path discovery. C.) Flow control and error checking. D.) Name resolution. E.) File manipulation.
What is difference between static and dynamic routing?
When would you use ISDN? A.) To connect LANs using POTS B.) To support applications requiring voice, data, and video C.) When you need a consistent and very high rate of data speed D.) To connect to IBM mainframes
Which two commands show your access lists? (Choose two) A. show filters B. show access-lists C. show ip access-lists D. show running-config
What is the syntax of ipv4?