what does PPTP use for encryption and authentication?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

what is the full fom of ping

17 Answers  


Two of the protocols that can be carried in the Protocol field of an IP packet are? A. TCP B. UDP C. FTP D. TFTP

2 Answers  


Which of the following protocols are used to get an IP address from a known MAC address? A.) BootP B.) TCP C.) IP D.) ARP E.) RARP F.) ICMP

1 Answers   CMC,


Hi my company network is creating loop and network performence is big slow and also all pc don,t get dhcp ip so pls let me know what is happing in my network.

3 Answers  


What is DHCP stand for?

0 Answers  






what is the difference b/w pap and chap,and give comand to configure pap cahp on two router r1 and r2,

1 Answers  


what is uplink port why are we use this port,this port having extra feature or only use to redundant link or other please explain it ,,,,,,,,,,,,,,,, bcz i am very confuse ..... Thanks

3 Answers  


Which of the following is a routing protocols? TCP RIP SMTP UDP

7 Answers  


What does the command "IP name-server 255.255.255.255" accomplish? A. It sets the domain name lookup to be a local broadcast. B. This is an illegal command. C. It disables domain name lookup. D. The command is now defunct and has been replaced by "IP server-name ip any"

1 Answers   Cisco,


I have one problem in my network my windows xp pc in workgroup there r 2 NIC card one I have disable in and second is active. The problem is in a day some time its ip conflict with other and when I see the event log and get the conflict ip mac and scan it with LAN scanner on one is there for that mac address nic in my network I have disable dhcp also don’t know what is the problem

8 Answers  


What is Cisco register bits? How they help?

1 Answers   jetking,


Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2

3 Answers  


Categories