what is secure hand shake protocol
Answers were Sorted based on User's Feedback
Answer / jitender sinha
it is also know as ssh protocol
it work on 3ree step
let supoose that machine 1 want to comunicate withe machine 2
then what process take place.
step 1 node one send the request to the node to and wiat for ack
step 2.node 2 accept the request and send the ack
step 3 node 1 acccept the request and send the request again
and communucation get stared
Is This Answer Correct ? | 2 Yes | 0 No |
Answer / nikhil maggu
Jeetu just want to correct you with your 3rd step
i.e after receiving ACK back the sender(or 1st node) sends
back ACK/confirmation[Not request] as to confirm start of
the session
Is This Answer Correct ? | 1 Yes | 0 No |
Which of the following provide correct information about a protocol at the transport layer of the OSI model? A.) UDP - Provides Connectionless datagrams service B.) TCP - Provides Connection Oriented Services C.) SMTP - Provides Mail Exchange D.) IP - Route determination E.) TCP - Provides Flow Control and Error Checking F.) FTP - Transfers of Files
Identify the OSI layer responsible for end-to-end connections? A.) Network B.) Transport C.) Session D.) Data link E.) TCP
Identify the following components of the IPX address 2e.0000.0065.ed43 A.) Not a valid IPX address B.) Network = 2e, Subnet = 0000, Node = 0065.ed43 C.) Network = 2e.0000, Node = 0065.ed43 D.) Network = 2e, Node = 0000.0065.ed43
Explain the difference between rip and ripv2?
ok this is practical senario question how can we comunicate two diffrent network host by i single 1603 sires of cisco router rember that the cisco series of that router have singe 100mbps ethernet now think think write all command answer is so simple i wiil; give the answer after 20 visit til then wait
Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2
In how many ways you can access router?
How many LMI types are available on Cisco routers? A.) Four B.) Two C.) Five D.) Three
Why we are not using subnet mask of class A in class C?before answering this question, just think upon if we do this then we don't need to move to IPv6.
When editing a line in the CLI mode, what does 'CTRL-A' do? A.) Moves you to the previous command. B.) Moves you to the next word. C.) Moves you to the end of the line. D.) Moves you to the next command. E.) Moves you to the beginning of the line.
What are the types of resource sharing?
Which layer of the 7 layer model is responsible for representing the application information between 2 different OS's? For example, converting ASCII to EBCIDIC. A.) Transport B.) Application C.) Physical D.) Session E.) Presentation F.) Network