Which three terms correctly define the forms of help available within the Cisco IOS?
hot keys
context-sensitive
command syntax check
What is the purpose of Microsoft Word?
The basic purpose of Microsoft Word is to be used as a text editor. It has many features to help with writing, such as a spellchecker to change "porpuse" to "purpose."
Does Cisco ASA have a firewall installed?
"Cisco ASA generally has a firewall installed, but you can configure anything to have the firewall shut off if you do it correctly. You can go to the Cisco website and learn more about ASA firewalls to suit your needs."
Ccna secuirty required ccnp router and switch?
Yes of course, CCNA Security required CCNP Router and Switching. CCNA Router and Switching cover the basic topic of networking starting from OSI Model, IP Addressing, router basic, RIP, EIGRP, VLAN, VTP, and many more and you must know basics before doing CCNA Security.
Which layer encapsulates the segments into packets?
TRANSPORT LAYER
The transport layer ensures that messages are delivered error-free, in sequence, and with no losses or duplications. It relieves the higher layer protocols from any concern with the transfer of data between them and their peers.
The size and complexity of a transport protocol depends on the type of service it can get from the network layer. For a reliable network layer with virtual circuit capability, a minimal transport layer is required. If the network layer is unreliable and/or only supports datagrams, the transport protocol should include extensive error detection and recovery.
The transport layer provides:
Typically, the transport layer can accept relatively large messages, but there are strict message size limits imposed by the network (or lower) layer. Consequently, the transport layer must break up the messages into smaller units, or frames, prepending a header to each frame.
The transport layer header information must then include control information, such as message start and message end flags, to enable the transport layer on the other end to recognize message boundaries. In addition, if the lower layers do not maintain sequence, the transport header must contain sequence information to enable the transport layer on the receiving end to get the pieces back together in the right order before handing the received message up to the layer above.
Network Layer
At what layer in the osi model would you find protocols such as rip and ospf?
OSPF and RIP are used in the network layer of the ISO model.
What are some issues with physical isolation of a LAN from the rest of a network?
Well, there is no interaction from the outside world. No file sharing, Etc.etc. Imaging you disconnected your computer from the internet. Your limited to what the machine in your isolated lan has to offer.
It will use type 7 encryption and will encrypt only the privileged EXEC level passwords
Is cisco a good company from which to purchase business telephones?
"When speaking with a customer service representative for Cisco, ask for referrals to help with your question. Many companies offer testimonials from current and past customers."
What is the router static routes cisco 6.8.1?
for R1-ISP
network - 192.168.23.0
mask - 255.255.255.192
next hop - 192.168.23.121 (R2's S/0/0/0 IP Address)
for R2-Central
network - 0.0.0.0
mask - 0.0.0.0
next hop - 192.168.23.122 (R1's S/0/0/0 IP Address)
Your R2-Central is right but your R1-ISP is wrong Sir!
correct R1-ISP
network - 172.16.0.0
mask - 255.255.254.0
next hop - 172.16.3.97
Are frames in the network layer?
No. Frames are used on the data-link (layer 2) layer. Packets are used at the Network (layer 3) layer.
How do you make an invisible program?
To make a program invisible, you can take one of the following methods:
(1) hide the user interface of the program. most programming languages provide APIs (Application Programming Interface) for you to hide the windows, task bar icons and other visible elements.
(2) create your program as a service. Services don't need user interfaces, so they are invisible to normal users.
(3) inject your program into other hosts (programs). This is the typical behavior of Trojans and Virus, this kind of program is prone to be detected as malicious software by anti-virus software, so it is not a good method to create normal programs.
What would you recommend for the core switches?
Depending on the size of the network and actual traffic requirements technically a "core layer switch" can scale from a 2960 all the way up to and beyond a 6500.
Which two factors are important when deciding which interior gateway routing protocol to use?
We use igrp in a autonomous system
and we use eigrp between two autonomous systems.