What are the different types of the password used in securing a cisco router?
No Answer is Posted For this Question
Be the First to Post Answer
what are the different symmetric algorithms?
What is topology in ccna?
Identify the type of hardware required to connect a Token ring network to an Ethernet network? A.) Repeater B.) TR-Enet C.) Router D.) Token Ring to Ethernet translation hub
i have donE B.E. IN COMPUTER SCIENCE AND THEN CCNA CERTIFICATOIN PLEASW LET ME KNOW IF ANY COMPANIES R HIRING FRESHERS PLEASE REPLY ON MY EMAIL ID karnailthakur@gmail.com
Which of the following provide connection-oriented transport to upper layer protocols? A.) SPX B.) RIP C.) NLSP D.) NCP
How would you configure one host name that points to two IP addresses? A. IP host jacob 1.0.0.5 2.0.0.8 B. IP jacob 1.0.0.5 2.0.0.8 C. IP host jacob 1.0.0.5 D. IP host duplicate "all"
1350 Value in which type of access-list?
Which command will give the following output: Tty Typ Tx/Rx A Modem Roty AccO AccI Uses Noise Overruns Int * 0 CTY - - - - - 0 0 0/0 - 1 AUX 9600/9600 - - - - - 0 0 0/0 - * 2 VTY - - - - - 2 0 0/0 - 3 VTY - - - - - 0 0 0/0 - 4 VTY - - - - - 0 0 0/0 - 5 VTY - - - - - 0 0 0/0 - 6 VTY - - - - - 0 0 0/0 -
MIDI and MPEG are examples of what layer of the OSI seven layer model? A.) Session B.) Network C.) Datalink D.) Transport E.) Application F.) Presentation
Which ipsec rule is used for the olympia branch and what does it define? (Choose two)
what is the diffrence betwwen telnet and ssh.this question is asked by nikhil and i am plasing the answer here insteed of his personal mail.
Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity