Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What are the different types of the password used in securing a cisco router?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

what are the different symmetric algorithms?

0 Answers   CCIE,


What is topology in ccna?

0 Answers  


Identify the type of hardware required to connect a Token ring network to an Ethernet network? A.) Repeater B.) TR-Enet C.) Router D.) Token Ring to Ethernet translation hub

1 Answers  


i have donE B.E. IN COMPUTER SCIENCE AND THEN CCNA CERTIFICATOIN PLEASW LET ME KNOW IF ANY COMPANIES R HIRING FRESHERS PLEASE REPLY ON MY EMAIL ID karnailthakur@gmail.com

0 Answers   HCL, Wipro,


Which of the following provide connection-oriented transport to upper layer protocols? A.) SPX B.) RIP C.) NLSP D.) NCP

1 Answers  


How would you configure one host name that points to two IP addresses? A. IP host jacob 1.0.0.5 2.0.0.8 B. IP jacob 1.0.0.5 2.0.0.8 C. IP host jacob 1.0.0.5 D. IP host duplicate "all"

1 Answers  


1350 Value in which type of access-list?

0 Answers  


Which command will give the following output: Tty Typ Tx/Rx A Modem Roty AccO AccI Uses Noise Overruns Int * 0 CTY - - - - - 0 0 0/0 - 1 AUX 9600/9600 - - - - - 0 0 0/0 - * 2 VTY - - - - - 2 0 0/0 - 3 VTY - - - - - 0 0 0/0 - 4 VTY - - - - - 0 0 0/0 - 5 VTY - - - - - 0 0 0/0 - 6 VTY - - - - - 0 0 0/0 -

1 Answers  


MIDI and MPEG are examples of what layer of the OSI seven layer model? A.) Session B.) Network C.) Datalink D.) Transport E.) Application F.) Presentation

3 Answers  


Which ipsec rule is used for the olympia branch and what does it define? (Choose two)

0 Answers  


what is the diffrence betwwen telnet and ssh.this question is asked by nikhil and i am plasing the answer here insteed of his personal mail.

4 Answers  


Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity

1 Answers  


Categories