Can you explain the basic of encryption in VPN?
No Answer is Posted For this Question
Be the First to Post Answer
Identify the hardware component that stores the backup configuration? A.) RAM B.) NVRAM C.) Flash D.) ROM
Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list
What is the network brouter?
How many collision domains are in switch?
What is the terminal emulation?
Define class full protocol?
Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical
what is the need og jitu(config)#ip helper address <ip address> can any one exaplain it briefly specially shain i am looking towards you.Becoz you are the only one who can solve my that problem not even jitendera sinha
What is a key use of a device hardware address? A. to obtain a vendor code / serial number from the user B. to transmit a frame from one Interface to another Interface C. to transmit a packet from one local device to another local device D. to transmit data from one local device to a remote device across the internet E. to contain logical information about the device to use for end-to-end transmission
Which can be true regarding VLANs? A.) They are created by location B.) They are created by function C.) They are created by department D.) They are created by group
Which of the following can reply to a Novell Get Nearest Server (GNS) request? A.) Local Novell server B.) Remote Novell Printer C.) Cisco router D.) Novell client
Identify the command to copy a configuration file from a TFTP server to a routers active configuration? A.) Router# copy running-config tftp B.) Router# copy tftp running-config C.) Router# copy tftp 172.16.0.1 running-config D.) Router(config)# copy tftp running-config