what are two security appliances that can be installed a
network
Answer Posted / anurag
firewall ,ssh
Is This Answer Correct ? | 8 Yes | 8 No |
Post New Answer View All Answers
When does network congestion occurs?
What port does rip use?
what command you must use if you want to delete or remove the configuration data that is stored in the NVRAM?
Which reserve port no http use?
Explain the difference between flsm and vlsm?
What is the subnet? Why is it used?
In stead of 0.0.0.0 wild card mask what you can write after ip?
What is the update period for rip?
How are internetworks created?
What is the attenuation?
What is ccna?
How many potions of ip?
What is the point-to-point protocol in ccna?
Wild card mask always in odd value or even?
How many valid ip will b in /21 in route summarization?