Which peer authentication method and which ipsec mode is used to connect to the branch locations?
No Answer is Posted For this Question
Be the First to Post Answer
Which of the following will apply IPX sap access list 1010 for incoming traffic, assume you are at the interface configuration? A.) ipx input-sap-filter 1010 in B.) ipx input-sap-filter 1010 C.) ipx access-group 1010 in D.) ipx access-list 1010 in
Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2
what is the network address?
Which layer called error detection layer?
Identify the X.25 addressing standard? A.) X.121 B.) X.25a C.) ITU-1 D.) Q933a
The Internet Protocol (IP) occurs at what layer of the seven layer model? A.) Physical B.) Presentation C.) Network D.) Datalink E.) Session F.) Transport
Name the protocol which can do load balancing on unequal cost also?
Explain the difference between collision domain and broadcast domain.
Explain the term 'multicast'.
What is half duplex and full duplex?
Hi all of you, Actually this is interview qe? but i did,t do explain it completely so please give reply recently and completly Ans, what is sub-interface and inter-vlan ? And How to implement it on cisco router & switches and also which series router switches supported please write..........
Identify 3 UDP characteristics? A.) Reliable communication protocol B.) Applications that use UDP must incorporate reliability C.) Connection-less oriented D.) Incorporates no handshaking