What is an advantage of CHAP over PAP?

A. Passwords are stored on separate servers in encrypted form

B. CHAP sends passwords unencrypted to save connection time

C. CHAP does not attempt to verify whether the user is
authorized to access the requested resource

D. ID?s and passwords are automatically stored in cache



What is an advantage of CHAP over PAP? A. Passwords are stored on separate servers in encrypted f..

Answer / guest

Answer: A

Cisco states, ?CHAP provides protection against playback
attack through the use of a variable challenge value that is
unique and unpredictable. The use of repeated challenges is
intended to limit the time of exposure to any single attack.
The host (or a third-party authentication server such as
Terminal Access Controller Access Control System - TACACS)
is in control of the frequency and timing of the challenges?.

Is This Answer Correct ?    7 Yes 2 No

Post New Answer

More CCDA Interview Questions

When should you apply SAP filters to Netware service advertisement messages? A. When services are not required for a particular area or network B. Only after service advertisement messages have flooded the network C. Before any type of router convergence takes place D. When no change in network services has taken place for 40 minutes

1 Answers  


When would you suggest static routes to your customers? A. When scalability is important B. When bandwidth is limited C. When the network will be changing frequently D. Always suggest static routes

1 Answers  


When characterizing a network, how many buffer misses should not be exceeded on a Cisco router per hour? A. 10 B. 25 C. 50 D. 100

1 Answers  


What is not a function of the distribution layer? A. Routing between VLANs B. Implement tools such as access lists, packet filtering, and queuing C. Implement security and network policies D. Provide workgroup/user access to the network

1 Answers  


A remote user needs a static IP address to support a specific application.Which remote access VPN addressing technique supports this ?

2 Answers   Pari Networks,






5. Which Two Settings must be configured in order to use the GUI to configure Call Admission Control with voice Applications

1 Answers   Pari Networks,


You may receive a case study including Token Ring and Ethernet, so you may want to look at any constraints with cabling between Token Ring and Ethernet networks. Which statement describes the constraints imposed by the existing network? A. Replace all cabling B. Test all cabling C. Do not replace cabling D. Use microwave instead of cabling

1 Answers  


It is not necessary to build an entire network to prove your network design. A. True B. False

1 Answers  


When are SNMP traps sent? A. When the SNMP manager wants to perform remote configuration on a networking device B. When an SNMP agent wants to inform the SNMP manager about a change of state on the networking device C. When the SNMP manager wants to access large chunks of data D. When the NMS wants to share trap information

2 Answers  


What protocol advertises Netware services to network clients? (Type acronym).

1 Answers  


What happens to performance if the maximum MTU (Maximum Transmission Unit) size is used? A. Performance increases B. Performance decreases C. Performance stays the same D. Performance has nothing to do with the MTU

1 Answers  


Which two of the following describe ASN.1 (Abstract Syntax Notation One)? A. It is an abstract routing protocol that is not used very often. B. It is an OSI language for describing data types independent of particular computer structures and representation techniques. C. Consists of only one basic routing algorithm. D. Uses BER (Basic Encoding Rules).

1 Answers  


Categories