Hi,can anyone explain me in brief about ccna security.
waiting for your answer

Answers were Sorted based on User's Feedback



Hi,can anyone explain me in brief about ccna security. waiting for your answer..

Answer / jitendera sinha

HI
this is jitendera here. i am a ccna and planing for ccna secur.to being a ccna secur u should have completed ccna.after that u can go through ccna secur.this is a important part of network admin and security.if you want that book?
then go to esnips.com
type three
cspfa

and download the pdf whose size is 24 mb
this is the complete book covreing ccan secur,cspa,csvpn and csi

Is This Answer Correct ?    0 Yes 0 No

Hi,can anyone explain me in brief about ccna security. waiting for your answer..

Answer / jitu

ccsp_complete_study_guide.pdf this is the link in esnips.com

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Identify the command to determine if an IP access-list is grouped on interface e0? A.) Router(config)# show ip interface e0 B.) Router> show ip interface e0 C.) Router# show interface e0 D.) Router# show ip interface e0

1 Answers  


When editing a line in the CLI mode, what does 'CTRL-A' do? A.) Moves you to the previous command. B.) Moves you to the next word. C.) Moves you to the end of the line. D.) Moves you to the next command. E.) Moves you to the beginning of the line.

1 Answers  


Which command, that is used to test address configuration, uses Time-To-Live (TTL) values to generate messages from each router. A) telnet B) ping C) trace D) bootp

4 Answers  


Identify the type of routing protocol that exchanges entire routing tables at regular intervals? A.) Link state B.) Interior gateway protocols C.) Appletalk routing D.) Distance vector

2 Answers  


Identify the 2 items that TCP and UDP share in common? A.) Both use port numbers to identify upper level applications B.) Operate at the Network layer C.) Both are Transport protocols D.) Both are reliable communications

1 Answers  






what is the purpose of multicast packets?

2 Answers  


In distance-vector routing, there is a problem known as the 'count to infinity' problem. What is the most direct solution to this? A.) Defining a Maximum. B.) You can not solve the 'count to infinity' problem with a distance vector protocol. C.) Poison Reverse. D.) Triggered Updates. E.) Split Horizon.

2 Answers  


Which layer is responsible for putting 1s and 0s into a logical group? A.) Session B.) Application C.) Transport D.) Data Link E.) Physical F.) Network

3 Answers  


What is an advantage of UDP? Low Overhead High Overhead Reliable Not reliable

4 Answers  


what is router?

9 Answers   IBM,


The Datalink layer works with which of the following: A.) Packets B.) Bits C.) Globules D.) Frames E.) Segments

2 Answers  


Your Ethernet interface currently has the IP address of 1.1.1.1/24. You would like it to have a second IP address of 2.2.2.2/24. Which command will do that? A.) ip address 1.1.1.1 2.2.2.2 255.255.255.0 B.) ip address 2.2.2.2 255.255.255.0 secondary C.) ip address 2.2.2.2 255.255.255.0 D.) This cannot be done, you can only have 1 IP address per physical interface. E.) ip address 2.2.2.2 /24

1 Answers  


Categories