Can you describe the Authentication Header (AH) Protocol?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

What is the difference between TCP and UDP? A.) TCP is connection-oriented; UDP uses acknowledgements only B.) TCP is connection-oriented; UDP is connectionless C.) Both TCP and UDP are connection-oriented, but only TCP uses windowing D.) TCP and UDP both have sequencing, but UDP is connectionless

4 Answers  


Why ESP Transport mode is not compatible with NAT????? Though New IP Header in Tunnel mode & Original IP Header in Transport mode are out of Authentication & Encryption.

1 Answers  


You want to clear the outputs on your serial interface showing errors on the interface. Which command do you type?

1 Answers  


hi everybody anybody have doubts in ccna please contact with me we will provide the solutions of the networking questions.my contact no. is 9885382098,abdulkhalid.5@gmail.com.

2 Answers  


Identify the command to display the Frame Relay map table? A.) Router# display frame-relay map B.) Router# show frame-relay map C.) Router(setup)# show frame-relay map D.) Router# show map frame-relay

1 Answers  






I am just getting into this,I want to jump ahead a do the packet tracers in discovery working at a small to medium business or ISP but I am trying to get the last lab putting it all together. Does anyone have anything for this. I know it is ahead of me but I would like to get this so I can look at the beginning and understand it more

2 Answers  


What is the default IPX Ethernet encapsulation? A.) SNAP B.) Arpa C.) 802.2 D.) Novell-Ether E.) SAP

2 Answers  


NetWare IPX addressing uses a network number and a node number. Which statements are true? A. The network address is administratively assigned and can be up to 16 hexadecimal digits long. B. The node address is always administratively assigned. C. The node address is usually the MAC address. D. If the MAC address is used as the node address, then IPX eliminates the use of ARP.

1 Answers  


Explain the term 'broadcast'.

0 Answers  


Tell me when we use standard access-list?

0 Answers  


Which protocol is used for booting diskless workstations? A.) IP B.) ARP C.) RARP D.) TCP E.) SNMP

2 Answers  


When using access lists, it is important where those access lists are placed. Which statement best describes access list placement? A. Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. B. Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible. C. It isn't import where access lists are placed since the router will read and cache the whole list. D. Put access lists as close to corporate headquarters as possible.

1 Answers  


Categories