What are the different types of the password used in securing a cisco router?
No Answer is Posted For this Question
Be the First to Post Answer
Which OSI Reference Layer controls end-to-end (host to host) communication? A.) Transport B.) Physical C.) Datalink D.) Network E.) Session
Identify the switching method that receives the entire frame then dispatches it? A.) Cut-through B.) Receive and forward C.) Store and forward D.) Fast forward
Which two commands show your access lists? (Choose two) A. show filters B. show access-lists C. show ip access-lists D. show running-config
A server is running HTTP, SMTP and DHCP. Which of the following best explains how the server is able to handle all three services over the same connection? The server has separate buffer areas for each application and forwards all data to each service. If the data does not apply to that application, it is discarded. The server processes each packet one at a time and forwards the data to the application that indicates that it is waiting for a transmission to arrive. The data is discarded if it does not apply to that application. The server uses the destination port number in the TCP/UDP header to identify the service. The data is forwarded to the service identified by the port number. The server uses separate three-way handshake connections to control the flow of the data and relates the service to the proper connection. This relationship allows the server to pass the data to the proper service.
In regards to the ISDN BRI standard, which channel is used for control? A.) B B.) D C.) E D.) I E.) Q
Tell me how many fillers we can put in one ip of ipv6?
What does the following line for an access list do? 'access-list 101 deny tcp 3.4.5.0 0.0.0.255 any eq 23' A.) deny all ftp traffic B.) deny all ftp traffic from subnet 3.4.5.0 C.) deny all telnet traffic from subnet 3.4.5.0 D.) deny all ftp traffic to subnet 3.4.5.0 E.) deny all telnet traffic
Which of the following are examples of the Session Layer? A.) IP B.) Netbios Names C.) NFS D.) Token Ring E.) SQL F.) TCP
Why is network segmentation a good idea when managing a large network?
What is protocol data unit in ccna?
Ping uses which Internet layer protocol? A.) RARP B.) ICMP C.) ARP D.) FTP
Hi,can anyone explain me in brief about ccna security. waiting for your answer