Answer Posted / manish sharma
HI jitendera
please Do not go away from this site .Do you know why i am
asking like beacuse due to yours answer posted on this site
is helped me to get the job in the networking filed.
Thank you again
Manish sharma
| Is This Answer Correct ? | 3 Yes | 2 No |
Post New Answer View All Answers
What are the steps of data encapsulation?
what is the concept of HA and FA in VPN tunneling?
Which command we give on privilege mode for coming back to user execution mode?
Suppose we are having two Switches i.e. Switch1 & Switch2 Port1 of Switch1 is Connected to Uplink and switch2 is also connected to switch1? So 1>Is there is any loop? 2>How we come to know that there is a loop created? 3>If we add Switch3 to switch2 then there is a possibility of loop Creation?
What are 10baset ethernet lans?
Define routing?
Explain the difference between arp and rarp?
Referring to the commands shown, what command must next be used on the branch router prior to traffic being sent to the router router?
Name which protocols are link states?
Which protocol works only on cisco routers?
which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?
Mention what command you must use if you want to delete or remove the configuration data that is stored in the nvram?
What are the advantages of lan switching?
Which type of routing you did in ccna?
What is the different between console port and auxiliary port?