Can you explain IKE (Internet Key Exchange)?
Answer / sami
IKE - Internet Key Exchange - negotiates security parameters
and authentication keys and handle the exchange of public keys
and manage the keys afterwords.
its a combination of 3 protocols
skeme - enables public key encryption for authentication
isaskmp - which defines how messages will be exchanged
oakley - which defines the mechanism for key exchanges
Is This Answer Correct ? | 1 Yes | 1 No |
Given the configuration example: interface ethernet0 ipx network 4a ipx access-group 800 out interface ethernet1 ipx network 3d interface ethernet2 ipx network tc access-list 800 permit 3d 4a Which action result from implementing this configuration? a-Traffic from network 3d for network 4a will be forwarded out e0 b-IPX network 5c will not receive any traffic c-Traffic from network 3d, destined for network 4a, will be forwarded out e2 d-Traffic from network 3d for network 3d will be forwarded out e0
A routing table contains static, RIP, and EIGRP routes for the same destination network. Which route would normally be used to forward data?
Which OSI Reference Layer is concerned with path determination? A.) Datalink B.) Physical C.) Network D.) Transport E.) Session
What is required to support full-duplex Ethernet? A.) Multiple paths between multiple stations on a link B.) Automatic sensing operation by all connected stations C.) Loopback and collision detection disabled D.) Full-duplex NIC cards
Identify the OSI layer which is responsible for end-to-end connections? A.) Network B.) Transport C.) Session D.) Data link E.) TCP
The Datalink Layer is broken down into 2 layers, LLC and MAC. The LLC establishes media independence and what else? A.) Provides Windowing. B.) Provides flow control. C.) Provides SAP's (Service Access Points). D.) The Datalink layer does not have sublayers. E.) Provides SAP's (Service Advertising Protocol). F.) RIP Updates.
As the system administrator, you type "ppp authentication chap pap secret". Which authentication method is used first in setting up a session? A. secret B. PAP C. CHAP D. PPP/SLIP
How many LMI types are available on Cisco routers? A.) Four B.) Two C.) Five D.) Three
hi shain can u send me some detail about bgp so that i can enhance my knowledge over bgp and can you also teach me about the process of suppernating. now what i am thinking that this could be last visit on that site overhere.so please mail that short of thing on my gmail id i am requesting to all of the visitor that please send theire doubt or question to my new gmail id which is jitendera.ccnainterview@gmail.com.i will try to solve it if i am capable to do it Wishing all of you for great future Jitendera kaumar sinha
How does L2TP process?
What does the User Datagram Protocol (UDP) provide? A.) Connectionless datagram service. B.) FECN & BECN C.) Flow control and error checking. D.) Name resolution. E.) Path discovery.
You want to clear the outputs on your serial interface showing errors on the interface. Which command do you type?