Name a major component of the Point-to-Point Protocol (PPP) to
negotiate and set up control options on the WAN data link.
A.) RFC 1661
B.) High Level Datalink Protocol (HDLC)
C.) Challenge Handshake Authentication Protocol (CHAP)
D.) SS7
E.) Link Control Protocol (LCP)
Answers were Sorted based on User's Feedback
Answer / guest
Answer: E
LCP negotiates many of the PPP settings during call setup.
| Is This Answer Correct ? | 2 Yes | 0 No |
In eigrp metric parameters which 2 options are enable by default?
Identify the command to configure the router to boot from an alternate IOS located in flash? A.) boot system flash IOS.exe B.) boot system tftp IOS.exe 172.16.5.1 C.) boot system alternate IOS.exe D.) boot system rom IOS.exe
LMI operates between the Frame Switch and what other device? A.) CPE device B.) Another Frame Switch C.) X.25 switch D.) Novell File Server
Can anyone explain the load balancing of PVST+????
Define load balancing?
hello i am new to this, i need to know how will i complete a basic scenario that ask the required number of networks that is 80 and the minimum number of host that is 3000 and the network address is 10.0.0.0 and i need to need how to compute to get the answer on what is the subnet mask.
Explain the draw back of ospf protocol?
Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed
Which way of communication bus topology use?
Port selection is done at which layer of OSI reference model?????
When a Distance Vector routing protocol detects that a connected network has gone down, it sends out a special routing update packet, telling all directly connected routers that the distance to the dead network is infinity. This is an example of which routing technology? A.) ICMP. B.) Only Link State routing protocols have this intelligence. C.) Triggered updates. D.) Garrison-4. E.) Split Horizon. F.) Poison Reverse.
If you are running Token Ring with Novell IPX routing, which encapsulation should you use? A.) SAP B.) SNAP C.) 802.5 D.) 802.2