what are two security appliances that can be installed a
network
Answer Posted / rohit dodia
Access list and Firewall
Is This Answer Correct ? | 0 Yes | 4 No |
Post New Answer View All Answers
Explain what is route poisoning?
What we called 64 bit mac-address in ipv6?
What is EIGRP?
What are the protocols that are used by every layer of ip/tcp model?
Hi Friend. i have to let you know that now i have been selected for cisco india in bangalore. i am thanking to all of you guys that u have been posted such good question and the respective answer. from today i will be not able to visit this site on regular basic and hopeing that you will continue to post the question.the question you are posting is not very usefull to you but also usefull to another. i am again thanking to all of you and hope for best for your feature. Jitendera kumar sinha Network engineer-L2 cisco india Bangalore
How many hop counts are by default and how much you can increase in eigrp protocol?
Can you explain in a generic manner the packet of IPSec?
Which cable called v.35?
Explain how many types of ips?
What is the default bandwidth size of t1 routers?
What do you mean by Port Mirroring?
In which ios version 182 people can access router through telenet?
What is the mesh network?
What is the difference between the communication and transmission?
Tell me how many reserve ports?