Which peer authentication method and which ipsec mode is used to connect to the branch locations?
No Answer is Posted For this Question
Be the First to Post Answer
Which statement about the flow control function of TCP is true? A. TCP makes no snarl to check for lost or duplicate data packets B. The application layer must sequence data packets when using TCP C. TCP controls the flow of UDP data through negative acknowledgements (NAK) D. TCP is a connection-oriented protocol that acknowledges receipt of data packets and is considered reliable
What is the difference between tracert and traceroute?
Define osi?
what is internetworking.
in the ospf area network dr and bdr selection procedure occur let there are 4 router in that n/w r1 have the higher priority then r2 and r2 have higher priority then r3 and so on like that r1>r2>r3>r4 now as we know that selection of dr and bdr based upon the router priority so in this case r1 will be dr and r2 will be bdr now my question is that if i am going to implement 5th router which have greater priority then r1 then will it become dr atomically remember that i am not going change my 5 or 1st router property answer that one please
what is the high order bit in class a 1 11 110 10 mine answer 1
Of the following characteristics, which apply to UDP? Connection-oriented Connectionless Error checking Low overhead Best-effort delivery
What is Data, management, native, default,trunk and access vlan?
Identify the type of routing protocol that maintains a topological database of the network? A.) Topological state B.) Shortest Path First C.) Link state D.) Distance vector
what is stub router
what is ping utility and how to work.
What is the extended IPX access list range? A.) 901-1000 B.) 100-199 C.) 900-999 D.) 1000-1000