When we use standard access-list?
No Answer is Posted For this Question
Be the First to Post Answer
Why Authentication Header (AH) is not compatible with the network that using NAT?????? Jitu, looking for u specially...!!!! U knw why i m looking for u..!!!
In order to configure a Frame Relay subinterface with IP identify the 2 commands that must be configured on the physcial interface? A.) Router(config-if)# encapsulation frame-relay B.) Router(config-if)# no ip address C.) Router(config-if)#encapsulation subinterface frame-relay D.) Router(config)# subinterface s0 encapsulation frame-relay
What is difference between baseband and broadband transmission in ccna?
Identify the hardware component that stores the backup configuration? A.) RAM B.) NVRAM C.) Flash D.) ROM
Identify the 2 hardware components used to manage and/or configure a router? A.) Auxiliary port B.) ROM port C.) Management port D.) Console port
Identify the type of routing protocol that maintains a topological database of the network? A.) Topological state B.) Shortest Path First C.) Link state D.) Distance vector
how to shutdown a Cisco router from command prompt?
11 Answers Atlas Systems, HCL,
What is switch priority & why it is used????
Which of the following protocols are used to get an IP address from a known MAC address? A.) BootP B.) TCP C.) IP D.) ARP E.) RARP F.) ICMP
Can yo define LNS
What do the following statements in an extended access list accomplish? access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21 access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20 access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255 A. This will block ftp traffic. B. This will block http traffic. C. This will permit ftp traffic. D. This will permit tftp traffic.
Identify 3 characteristics of a MAC address? A.) Burned into the NIC B.) 48 bits long C.) Length is 32 bits D.) Used to deliver the frame to the end device E.) Contains a network portion and a host portion