What is an advantage of CHAP over PAP?
A. Passwords are stored on separate servers in encrypted form
B. CHAP sends passwords unencrypted to save connection time
C. CHAP does not attempt to verify whether the user is
authorized to access the requested resource
D. ID?s and passwords are automatically stored in cache
Answer / guest
Answer: A
Cisco states, ?CHAP provides protection against playback
attack through the use of a variable challenge value that is
unique and unpredictable. The use of repeated challenges is
intended to limit the time of exposure to any single attack.
The host (or a third-party authentication server such as
Terminal Access Controller Access Control System - TACACS)
is in control of the frequency and timing of the challenges?.
| Is This Answer Correct ? | 7 Yes | 2 No |
What are the four basic components of an AppleTalk network? A. Sockets B. Nodes C. Networks D. Areas E. Zones
A device has 2 synchronous ports, 16 asynchronous ports, and one ethernet port. What is this device most likely to be? A. CSU/DSU B. Access Server C. Multiplexer D. ISDN Terminal Adapter
difference between layer 3 switch and router
0 Answers Aptron, Tech Mahindra,
When would you suggest static routes to your customers? A. When scalability is important B. When bandwidth is limited C. When the network will be changing frequently D. Always suggest static routes
You want to assign IP addresses to a large number of workstations. What is the best way to do this? A. Cisco Network Registrar B. Cisco IOS NAT Feature C. Assign them static IP addresses D. Let the workstation assign its own IP address
How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data
In an ATM network, which type of device is in a LAN per ELAN (Emulated LAN)? A. LAN Emulation Workstation B. LAN Emulation Router C. LAN Emulation Server D. LAN Emulation Bridge
What AppleTalk protocol permits AppleTalk workstations to share files across a network?
What are the three commonly used methods of flow control used for handling network congestion? A. Buffering B. Source-quench messages C. Error checking D. Windowing
What type of address is analyzed by a Layer 2 switch? A. network address B. MAC and network address C. Protocol type, MAC, and network address D. MAC address
What are three ASN.1 (Abstract Syntax Notation One) data types? A. data feeds B. name C. syntax D. encoding
What is the technique used by a router that can automatically initiate and close a circuit-switched session? A. PLP B. LAPP C. ASN.1 D. DDR