what is secure hand shake protocol
Answers were Sorted based on User's Feedback
Answer / jitender sinha
it is also know as ssh protocol
it work on 3ree step
let supoose that machine 1 want to comunicate withe machine 2
then what process take place.
step 1 node one send the request to the node to and wiat for ack
step 2.node 2 accept the request and send the ack
step 3 node 1 acccept the request and send the request again
and communucation get stared
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / nikhil maggu
Jeetu just want to correct you with your 3rd step
i.e after receiving ACK back the sender(or 1st node) sends
back ACK/confirmation[Not request] as to confirm start of
the session
| Is This Answer Correct ? | 1 Yes | 0 No |
Identify the type of routing protocol that maintains a topological database of the network? A.) Topological state B.) Shortest Path First C.) Link state D.) Distance vector
Which of the following are examples of the Session Layer? A.) IP B.) Netbios Names C.) NFS D.) Token Ring E.) SQL F.) TCP
Identify 3 IP routing protocols? A.) RIP B.) AURP C.) OSPF D.) IGRP E.) ARP F.) ICMP
A ISDN BRI circuit can be described as a which of the following? A.) 3B channels B.) 2-64Kbps B channels and 1-16Kbps D channel C.) none of the above D.) 2-64Kbps B channels and 1-16Kbps C channel
hi everybody anybody have doubts in ccna please contact with me we will provide the solutions of the networking questions.my contact no. is 9885382098,abdulkhalid.5@gmail.com.
Which statement is true regarding full duplex? A.) Allows for transmission and receiving of data simultaneously B.) Only works in a multipoint configuration C.) Does not affect the bandwidth D.) Allows for transmission and receiving of data but not a the same time
Identify the hardware component that stores the bootstrap program? A.) ROM B.) NVRAM C.) Booter load D.) RAM E.) Flash
Given the configuration example: interface ethernet0 ipx network 4a ipx access-group 800 out interface ethernet1 ipx network 3d interface ethernet2 ipx network tc access-list 800 permit 3d 4a Which action result from implementing this configuration? a-Traffic from network 3d for network 4a will be forwarded out e0 b-IPX network 5c will not receive any traffic c-Traffic from network 3d, destined for network 4a, will be forwarded out e2 d-Traffic from network 3d for network 3d will be forwarded out e0
what is vc,pvc,lmi and dlsi
What is the purpose of Split Horizon? A.) It prevents the regular update messages from reinstating a route that has gone down B.) Information received on an interface cannot be sent back out the same interface C.) Informs all neighbor routers that two routes exist D.) Tells the router the destination is unreachable
Explain on which interface we always apply access-list?
Identify the definition of demarcation? A.) Date in which the WAN service contract expires B.) Cabling which extends from the WAN service provider to the customer C.) Division of responsibility, where the CPE ends and the local loop begins D.) Equipment which is located at the customer premises