Which command will enable CHAP authentication on a serial

interface that is using PPP?

A.) encapsulation chap

B.) ppp chap

C.) ppp enable chap

D.) ppp encapsulation chap

E.) ppp authentication chap

F.) ppp chap enable

Answers were Sorted based on User's Feedback



Which command will enable CHAP authentication on a serial interface that is using PPP? A.) enc..

Answer / guest

Answer: E

Is This Answer Correct ?    8 Yes 0 No

Which command will enable CHAP authentication on a serial interface that is using PPP? A.) enc..

Answer / jayabhaskar

ppp authentication chap

Is This Answer Correct ?    4 Yes 0 No

Post New Answer

More CCNA Interview Questions

Identify the purpose of the wildcard mask? A.) Match a certain portion of the IP address while ignoring the rest of the address B.) Determine the class of the IP address C.) Determine the network portion of an IP address D.) Hide the host portion of an IP address

1 Answers  


Which of the following is a routing protocols? TCP RIP SMTP UDP

7 Answers  


Which command sets IGRP as the routing protocol for autonomous system 100? A. Router(config)#igrp 100 B. Router(config)#network 100 C. Router(config)#router igrp 100 D. Router(config)#enable igrp 100

1 Answers  


What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet

3 Answers  


Can you explain PPP protocol?

0 Answers   CCIE,






Hub in star topology or bus topology?

0 Answers  


Station A is transmitting data to station B faster that station B can handle it. When station B's buffer fills up, it send out a message to station A to stop sending data. After B empties out its buffer, station B sends a message to station A to start sending data again. This is most directly an example of (pick the best answer only): A.) Poison Reverse B.) Connectionless protocol C.) Windowing D.) Connection oriented protocol E.) Flow Control F.) Split Horizon

1 Answers  


Why Clock rate command is not configured on ethernet interface of a router?

6 Answers  


What is the bandwidth capacity of one ISDN B channel A. 64 kbps B. 128 kbps C. 512 kbps D. 1.54 mkbps

3 Answers  


IP extended access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) all of the above C.) protocol D.) source address E.) port

3 Answers  


Identify the mode reflected by the following prompt 'Router'? A.) Setup B.) RXBoot C.) Boot mode D.) Privileged exec mode

1 Answers  


How many tables are in ospf protocol?

0 Answers  


Categories