What is an advantage of CHAP over PAP?
A. Passwords are stored on separate servers in encrypted form
B. CHAP sends passwords unencrypted to save connection time
C. CHAP does not attempt to verify whether the user is
authorized to access the requested resource
D. ID?s and passwords are automatically stored in cache
Answer / guest
Answer: A
Cisco states, ?CHAP provides protection against playback
attack through the use of a variable challenge value that is
unique and unpredictable. The use of repeated challenges is
intended to limit the time of exposure to any single attack.
The host (or a third-party authentication server such as
Terminal Access Controller Access Control System - TACACS)
is in control of the frequency and timing of the challenges?.
Is This Answer Correct ? | 7 Yes | 2 No |
Which of the following three sets of IP addresses and subnet masks are private IP addresses? A. 10.0.0.0 255.0.0.0 B. 172.16.0.0 255.255.0.0 C. 172.16.0.0 255.240.0.0 D. 192.168.0.0 255.255.0.0
What is an advantage of CHAP over PAP? A. Passwords are stored on separate servers in encrypted form B. CHAP sends passwords unencrypted to save connection time C. CHAP does not attempt to verify whether the user is authorized to access the requested resource D. ID?s and passwords are automatically stored in cache
Which IP address is not a private address? A. 142.18.0.0 B. 10.0.0.0 C. 172.16.0.0 D. 192.168.0.0
You may receive a case study including Token Ring and Ethernet, so you may want to look at any constraints with cabling between Token Ring and Ethernet networks. Which statement describes the constraints imposed by the existing network? A. Replace all cabling B. Test all cabling C. Do not replace cabling D. Use microwave instead of cabling
What category or categories does Client/Server fit into the following Job Aid? Name of Protocol Type of Protocol # of Users # of Hosts or Servers Comments
What type of address is analyzed by a Layer 2 switch? A. network address B. MAC and network address C. Protocol type, MAC, and network address D. MAC address
What are two services that DUAL (Diffusing Update Algorithm) performs for EIGRP? A. Provides loop-free operation throughout an entire route?s computation B. Simultaneous synchronization of routers involved in a topology change C. Updates the autonomous system number D. Allows advertised distances to use feasible distances
Which router would you choose for your design? A. 1600 B. 1700 C. 3600 D. 3640 E. 7200
When are SNMP traps sent? A. When the SNMP manager wants to perform remote configuration on a networking device B. When an SNMP agent wants to inform the SNMP manager about a change of state on the networking device C. When the SNMP manager wants to access large chunks of data D. When the NMS wants to share trap information
In an ATM network, which type of device is in a LAN per ELAN (Emulated LAN)? A. LAN Emulation Workstation B. LAN Emulation Router C. LAN Emulation Server D. LAN Emulation Bridge
Which condition does not create LAN media problems? A. Protocol doesn?t scale well B. Long wait for the token C. Excessive collisions D. Too many devices
Match the following services with the correct descriptions: A. BRI 1. Provides two 64 Kbps B channels B. PRI 2. Provides 23 or 30 B channels 3. Provides one 16 Kbps D channel 4. Provides one 64 Kbps D channel 5. Provides a total bit rate of 2.048 Mbps in Europe and Australia 6. Provides a total bit rate of 144 Kbps 7. Provides a total bit rate of 1.544 Kbps in North America and Japan