How do we do encryption and authentication in L2F?
No Answer is Posted For this Question
Be the First to Post Answer
Frame relay technology works on which layer of osi model?
How many networks route update does a router recieves in RIP at once ?
What is the virtual path?
hi all.. can any one explain the complete topology of stp and rstp how it works . root swtch connects to a root port and then root port conenct to other switchs designated port. i was going thru his site http://www.cisco.com/en/US/tech/tk389/tk621/technologies_whi te_paper09186a0080094cfa.shtml in which DR also exist on root switch only which makes my understanding grim.I had a diff notion of stp all together. please post asap. and if possible refer a url so thst i can read it my self .. thanks
NetWare IPX addressing uses a network number and a node number. Which statements are true? A. The network address is administratively assigned and can be up to 16 hexadecimal digits long. B. The node address is always administratively assigned. C. The node address is usually the MAC address. D. If the MAC address is used as the node address, then IPX eliminates the use of ARP.
What does a Standard IP Access-list use as test criteria? A.) IP source address B.) IP source and destination address, protocol numbers and port numbers C.) IPX source and destination address D.) Source MAC address
What is the size of hello packets in eigrep protocol?
What 2 commands verify end to end communications? A.) Trace B.) debug ip session C.) Ping D.) Route
What is the function of Layer 2 Switch?
Difference between Distance vector, Link state protocols
IPX routing updates occur how often? A.) Every 30 seconds B.) Every 60 seconds C.) Only as needed D.) When the remote router asks for an update
If you are running Token Ring with Novell IPX routing, which encapsulation should you use? A.) SAP B.) SNAP C.) 802.5 D.) 802.2