which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?
No Answer is Posted For this Question
Be the First to Post Answer
Based upon the 1st octet rule identify the range for a Class A address? A.) 1 - 126 B.) 192 - 223 C.) 128 - 191 D.) 1 - 191
What does the term Base refer to in 100BaseT A. cabling type B. singnal type C. 100 mode type D. spectrum used E. speed category
Define the different kinds of casting
Tell me how much internal and external ad of eigrp protocol?
Identify the 2 rules used when configuring a Distance Vector routing protocol? A.) Physically connected network(s) B.) Configure the classful address, no subnets C.) Enable CDP so neighbors can be detected D.) Configure all networks in Area0
What utility can you use to see the path a packet takes through an internetwork? A.) Route B.) SNMP C.) Trace D.) Ping
In Cisco IOS software which command displays the backup configuration? A. show flahh B. show version C. show tftp-config D. show backup-config E. show startup-config
10.1.1.0 n/w advertised as /16 from EIGRP & /24 from OSPF which will come in routing table & why
When we use router?
What is the extended IPX access list range? A.) 901-1000 B.) 100-199 C.) 900-999 D.) 1000-1000
When discussing static routes, what is the gateway parameter used for? A.) Determining the dynamic route B.) Defining the subnet C.) Defining the Administrative Distance D.) Determining the next hop
Identify the command to reload the router? A.) Router(config)# reload B.) Router# reset C.) Router# reload D.) Router> reload