Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Hi,can anyone explain me in brief about ccna security.
waiting for your answer

Answers were Sorted based on User's Feedback



Hi,can anyone explain me in brief about ccna security. waiting for your answer..

Answer / jitendera sinha

HI
this is jitendera here. i am a ccna and planing for ccna secur.to being a ccna secur u should have completed ccna.after that u can go through ccna secur.this is a important part of network admin and security.if you want that book?
then go to esnips.com
type three
cspfa

and download the pdf whose size is 24 mb
this is the complete book covreing ccan secur,cspa,csvpn and csi

Is This Answer Correct ?    0 Yes 0 No

Hi,can anyone explain me in brief about ccna security. waiting for your answer..

Answer / jitu

ccsp_complete_study_guide.pdf this is the link in esnips.com

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Identify the 3 major functions at layer 3 of the OSI model? A.) Forwarding process B.) Logical addressing C.) End-to-end connnections D.) Path selection E.) MAC address examination F.) Network monitoring

2 Answers  


Which of the following are Session Layer standards? A.) ASCII and EBCDIC B.) MPEG and MIDI C.) RPC and SQL D.) JPEG and PICT

3 Answers  


Eight stations connected to separate 10 Mobs pods on a Layer 2 switch will give each station how many Mobs of bandwidth? A. 1.25 B. 4 C. 16 D. 10 E. 80

1 Answers  


Why we used Virtual MAC in GLBP

0 Answers   Infosys,


Identify 3 ways in which a router can be configured? A.) TFTP B.) Nvram C.) Ping D.) Console E.) Trace

2 Answers  


In order to limit the quantity of numbers that a system administrator has to enter, Cisco can use which abbreviation to indicate 0.0.0.0? A. host B. any C. all D. include

1 Answers  


Which element is used to define the rate in bits per second that a Frame Relay switch agrees to transfer data? A. clock rate (CP) B. Committed Information Rate (CIR) C. Local Management Interface (LMI) D. data link connection identifier (DICI) E. Committed Rate Measurement Intercal (CRIMI)

2 Answers  


How many types of router?

0 Answers  


R1#sh ip nat translations Pro Inside global Inside local Outside local Outside global icmp 15.1.1.1:11 10.1.1.1:11 30.1.1.1:11 30.1.1.1:11 icmp 15.1.1.1:12 10.1.1.1:12 20.1.1.1:12 20.1.1.1:12 icmp 15.1.1.1:13 10.1.1.1:13 21.1.1.1:13 21.1.1.1:13 icmp 15.1.1.1:14 10.1.1.1:14 31.1.1.1:14 31.1.1.1:14 R1# So my question is that after every ip address [:] is used & some number. 15.1.1.1{:11}... what is this colon & number indicate. Can anyone tel me this..!!! Thanking you advance. Shahin

4 Answers  


Cisco routers can secure the enable password with a one-way hash algorithm. What command would encrypt the enable password with the strong encryption method? A.) enable encrypt john B.) password john C.) enable secret john D.) enable password john E.) secret john F.) enable password 5 john

1 Answers  


What is Route Poisoning?

0 Answers  


Identify the 3 pieces of hardware you would not install to prevent broadcasts? A.) Switch B.) Repeater C.) Bridge D.) Router

3 Answers  


Categories