what is secure hand shake protocol

Answers were Sorted based on User's Feedback



what is secure hand shake protocol..

Answer / jitender sinha

it is also know as ssh protocol
it work on 3ree step
let supoose that machine 1 want to comunicate withe machine 2
then what process take place.
step 1 node one send the request to the node to and wiat for ack
step 2.node 2 accept the request and send the ack
step 3 node 1 acccept the request and send the request again
and communucation get stared

Is This Answer Correct ?    2 Yes 0 No

what is secure hand shake protocol..

Answer / nikhil maggu

Jeetu just want to correct you with your 3rd step
i.e after receiving ACK back the sender(or 1st node) sends
back ACK/confirmation[Not request] as to confirm start of
the session

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCNA Interview Questions

Which of the following provide correct information about a protocol at the transport layer of the OSI model? A.) UDP - Provides Connectionless datagrams service B.) TCP - Provides Connection Oriented Services C.) SMTP - Provides Mail Exchange D.) IP - Route determination E.) TCP - Provides Flow Control and Error Checking F.) FTP - Transfers of Files

1 Answers  


Identify the OSI layer responsible for end-to-end connections? A.) Network B.) Transport C.) Session D.) Data link E.) TCP

4 Answers  


Identify the following components of the IPX address 2e.0000.0065.ed43 A.) Not a valid IPX address B.) Network = 2e, Subnet = 0000, Node = 0065.ed43 C.) Network = 2e.0000, Node = 0065.ed43 D.) Network = 2e, Node = 0000.0065.ed43

1 Answers  


Explain the difference between rip and ripv2?

0 Answers  


ok this is practical senario question how can we comunicate two diffrent network host by i single 1603 sires of cisco router rember that the cisco series of that router have singe 100mbps ethernet now think think write all command answer is so simple i wiil; give the answer after 20 visit til then wait

2 Answers  






Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2

1 Answers  


In how many ways you can access router?

0 Answers  


How many LMI types are available on Cisco routers? A.) Four B.) Two C.) Five D.) Three

1 Answers  


Why we are not using subnet mask of class A in class C?before answering this question, just think upon if we do this then we don't need to move to IPv6.

2 Answers  


When editing a line in the CLI mode, what does 'CTRL-A' do? A.) Moves you to the previous command. B.) Moves you to the next word. C.) Moves you to the end of the line. D.) Moves you to the next command. E.) Moves you to the beginning of the line.

1 Answers  


What are the types of resource sharing?

0 Answers  


Which layer of the 7 layer model is responsible for representing the application information between 2 different OS's? For example, converting ASCII to EBCIDIC. A.) Transport B.) Application C.) Physical D.) Session E.) Presentation F.) Network

2 Answers  


Categories