How do we do encryption and authentication in L2TP?
No Answer is Posted For this Question
Be the First to Post Answer
What is the result of using a hierarchical addressing framework? A. increased availability of addresses B. decreased distance between routers C. increased router memory requirements D. no need to maintain routing information
If line up, but protocol down which layer should be troubleshot?
The Internet Control Message Protocol occurs at what layer of the seven layer model? A.) Physical B.) Transport C.) Session D.) Datalink E.) Presentation F.) Network
IP RIP routing is conferred on a router but not all interfaces attach to RIP networks. What should you use to prevent all RIP routing updates from being sent through selecedc interfaces without using access lists? A. passive route B. default routes C. passive interface D. route update filtering
what is the purpose of multicast packets?
How is private ip different from public ip?
what do you mean by port triggering?
In Novell's use of RIP, there are two metrics used to make routing decisions. Select the two metrics. A. Ticks. B. Hops C. Loops D. Counts
Identify 3 UDP characteristics? A.) Reliable communication protocol B.) Applications that use UDP must incorporate reliability C.) Connection-less oriented D.) Incorporates no handshaking
which portecol is faster tcp udp spx
How does a switch use store and forward? A.) By using a Class I repeater in a collision domain B.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface C.) By using broadcast addresses as source addresses D.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets
what are layer hierarchy of cisco