Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


what is secure hand shake protocol

Answers were Sorted based on User's Feedback



what is secure hand shake protocol..

Answer / jitender sinha

it is also know as ssh protocol
it work on 3ree step
let supoose that machine 1 want to comunicate withe machine 2
then what process take place.
step 1 node one send the request to the node to and wiat for ack
step 2.node 2 accept the request and send the ack
step 3 node 1 acccept the request and send the request again
and communucation get stared

Is This Answer Correct ?    2 Yes 0 No

what is secure hand shake protocol..

Answer / nikhil maggu

Jeetu just want to correct you with your 3rd step
i.e after receiving ACK back the sender(or 1st node) sends
back ACK/confirmation[Not request] as to confirm start of
the session

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCNA Interview Questions

What is true about frame-relay DLCI? A.) DLCI represents a single physical circuit B.) DLCI is optional in all frame-relay networks C.) DLCI identifies a logical connection between DTE devices D.) DLCI is used to tag the beginning of a frame with VLAN information

1 Answers  


can we configure multiple as on single router using eigrp

1 Answers   IBM,


Hi,can anyone explain me in brief about ccna security. waiting for your answer

2 Answers  


Identify the command that displays the SAP table? A.) show ipx servers B.) display SAP table C.) display SAP's D.) show sap table

1 Answers  


Cisco routers can secure the enable password with a one-way hash algorithm. What command would encrypt the enable password with the strong encryption method? A.) enable encrypt john B.) password john C.) enable secret john D.) enable password john E.) secret john F.) enable password 5 john

1 Answers  


What protocols can you use while testing Trace? A.) DECnet B.) CLNS C.) IP D.) Old Vines E.) Vines F.) Chaos

1 Answers  


Hi all, Sorry, but i want to say that right now i have around two years experience and doing the job as a network engineer(ccna certified).but i want switch job so please can tell me any opportunity.

1 Answers   Wipro,


IPX routing updates occur how often? A.) Every 30 seconds B.) Every 60 seconds C.) Only as needed D.) When the remote router asks for an update

1 Answers  


State the difference between dynamic IP and static IP addressing?

0 Answers  


What is the routing metric used by RIP? A.) Route poisoning B.) Split horizon C.) Hop Count D.) TTL

4 Answers   jetking, Tata Motors,


Which of the following will apply IPX sap access list 1010 for incoming traffic, assume you are at the interface configuration? A.) ipx input-sap-filter 1010 in B.) ipx input-sap-filter 1010 C.) ipx access-group 1010 in D.) ipx access-list 1010 in

1 Answers  


Which layer is responsible for coordinating communication between systems? A.) Application B.) Network C.) Session D.) Transport E.) Physical F.) Data Link

2 Answers   HCL,


Categories