Which of these is the Private key?
A. Bear
B. Cave
C. Indian
D. Cowboy
Answer Posted / guest
Answer: B
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
Tell me when we use standard access-list?
Which peer authentication method and which ipsec mode is used to connect to the branch locations?
Define the virtual path?
If bandwidth will increase what will happen?
what are the different asymmetric algorithms?
What do you understand by ‘protocol’ in networking?
In how many ways you can access router?
Why subnetting is used?
Mention what is the difference between the switch, hub, and router?
Tell me which multicast ip eigrp protocol use?
What is de-encapsulation?
Does a bridge divide a network into smaller segments?
Which multicast ip eigrp protocol use?
What is an autonomous system?
What is GRE in PPTP?