Identify 2 features of PPP CHAP authentication?
A.) Username and password is sent in clear text
B.) Authentication messages are sent periodically during the
connection
C.) Less secure then PAP
D.) Local router 'challenges' the remote router
Answer / guest
Answer: B D
PPP CHAP authentication message are sent periodically during the
connection by challenging the other end of the connection.
It is more secure than PAP and passwords and username are
encrypted.
| Is This Answer Correct ? | 2 Yes | 0 No |
Wnat do you know about zenpeck
Can anybody tell me how to configure a cisco router?
Which type for communication switch do?
When using RIP, routing updates are broadcast every ____ seconds. A. 30 B. 10 C. 60 D. 90
Identify the keystroke to position the cursor to the beginning of a command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z
Which way of communication bus topology use?
Which of these is the Private key? A. Bear B. Cave C. Indian D. Cowboy
When ip confliction accord in subnet which ip assigned automatically and what it called?
(1)what is "rtp" and how it work, (2)what is diffrence between igrp and eigrp (3)the slection prcedure of dr and bdr is depend open (4)why frame really is called nbma (5)what is ppp (6) what is diffrence b/w tcp and udp (7) how can we implement ospf protocall on any router (8)whta is as nomber (9)what is AD value (10)what is the broadcast id,n/w id and number of vallid host of the 255.255.255.128/25 195.168.10.10/25 (11) what is stub network (12) what is contigues n/w (13)on which type of router we can implement default routing (14)what is diffrence b/w hub switch;switch router, (15)what is v lan (16)what is the diffrence b/w link sate protocal and distance vector protocall (17)what is synchoransh mode of data transfer and asynchronash mode of data transfer (18) question on lab, belive me frnds there are 20 questions and 5 questions on lab implimentaion.around 1.1/2 hour i was in interview room and after givieng 17 right answera and 4 in lab i got slected try to give answer if any difficulty or any prob plz email me on jitenderasinha.it@gmail.com if any one of you havae boson netsim plz also intimate me
What are the steps of conversion for data encapsulation?
The Internet Control Message Protocol occurs at what layer of the seven layer model? A.) Physical B.) Transport C.) Session D.) Datalink E.) Presentation F.) Network
When configuring the subnet mask for an IP address, which formats can be used?A. dotted-decimal. B. Hexadecimal C. Bit-count D. Octal E. Binary