What requirements should a VPN fulfill?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

What is loop back ip in ipv6?

0 Answers  


Which two of the following protocols are used at the Transport layer? A.) ARP B.) UDP C.) ICMP D.) RARP E.) TCP F.) BootP

1 Answers  


hi shain can u send me some detail about bgp so that i can enhance my knowledge over bgp and can you also teach me about the process of suppernating. now what i am thinking that this could be last visit on that site overhere.so please mail that short of thing on my gmail id i am requesting to all of the visitor that please send theire doubt or question to my new gmail id which is jitendera.ccnainterview@gmail.com.i will try to solve it if i am capable to do it Wishing all of you for great future Jitendera kaumar sinha

0 Answers   HCL,


Which of the following are used by routers to learn routes to be added to the routing table? Ping and Traceroute MAC address resolution Acknowledgments and Sequence Numbers Routing updates and static routes

1 Answers  


What is the beaconing?

0 Answers  






What does data packets consist of?

0 Answers  


what is firewall how fiarewall work how many interfaeces in the cisco pix 501 firewall what is the working of that dmz interface

3 Answers   Aptron, Volvo,


When ip confliction accord in subnet which ip assigned automatically and what it called?

0 Answers  


Which frame has a Type field to identify the upper-layer protocol? A.) 802.3 B.) 802.2 C.) 802.5 D.) Ethernet_II

2 Answers  


Which protocol you manually enable route summarization?

0 Answers  


Identify the purpose of the wildcard mask? A.) Match a certain portion of the IP address while ignoring the rest of the address B.) Determine the class of the IP address C.) Determine the network portion of an IP address D.) Hide the host portion of an IP address

3 Answers  


Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address

1 Answers  


Categories