Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What are the different types of the password used in securing a cisco router?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

Which OSI Reference Layer controls end-to-end (host to host) communication? A.) Transport B.) Physical C.) Datalink D.) Network E.) Session

1 Answers  


Identify the switching method that receives the entire frame then dispatches it? A.) Cut-through B.) Receive and forward C.) Store and forward D.) Fast forward

2 Answers  


Which two commands show your access lists? (Choose two) A. show filters B. show access-lists C. show ip access-lists D. show running-config

2 Answers  


A server is running HTTP, SMTP and DHCP. Which of the following best explains how the server is able to handle all three services over the same connection? The server has separate buffer areas for each application and forwards all data to each service. If the data does not apply to that application, it is discarded. The server processes each packet one at a time and forwards the data to the application that indicates that it is waiting for a transmission to arrive. The data is discarded if it does not apply to that application. The server uses the destination port number in the TCP/UDP header to identify the service. The data is forwarded to the service identified by the port number. The server uses separate three-way handshake connections to control the flow of the data and relates the service to the proper connection. This relationship allows the server to pass the data to the proper service.

1 Answers  


In regards to the ISDN BRI standard, which channel is used for control? A.) B B.) D C.) E D.) I E.) Q

2 Answers  


Tell me how many fillers we can put in one ip of ipv6?

0 Answers  


What does the following line for an access list do? 'access-list 101 deny tcp 3.4.5.0 0.0.0.255 any eq 23' A.) deny all ftp traffic B.) deny all ftp traffic from subnet 3.4.5.0 C.) deny all telnet traffic from subnet 3.4.5.0 D.) deny all ftp traffic to subnet 3.4.5.0 E.) deny all telnet traffic

1 Answers  


Which of the following are examples of the Session Layer? A.) IP B.) Netbios Names C.) NFS D.) Token Ring E.) SQL F.) TCP

2 Answers  


Why is network segmentation a good idea when managing a large network?

0 Answers  


What is protocol data unit in ccna?

0 Answers  


Ping uses which Internet layer protocol? A.) RARP B.) ICMP C.) ARP D.) FTP

3 Answers  


Hi,can anyone explain me in brief about ccna security. waiting for your answer

2 Answers  


Categories