Can you explain PPTP (Point-to-Point Tunneling Protocol)?
Answer / muhammad junaid malik
The Point-to-Point Tunneling Protocol (PPTP) is a method for
implementing virtual private networks. PPTP uses a control
channel over TCP and a GRE tunnel operating to encapsulate
PPP packets
| Is This Answer Correct ? | 1 Yes | 0 No |
What are the conversion steps of data encapsulation?
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
Which three devices can be used to convert the user data from the DTE into a form acceptable to the WAN service's facility? A. Modem B. CSU/DSU C. TA/NT1 D. CO E. SS7
What is true when using DDR? A.) HDLC is the preferred encapsulation B.) You must use static routing C.) You should use dynamic routing D.) You should use ISDN
1350 Value in which type of access-list?
The Datalink Layer is broken down into 2 layers, LLC and MAC. The LLC establishes media independence and what else? A.) Provides Windowing. B.) Provides flow control. C.) Provides SAP's (Service Access Points). D.) The Datalink layer does not have sublayers. E.) Provides SAP's (Service Advertising Protocol). F.) RIP Updates.
Which layer of the 7 layer model is responsible for representing the application information between 2 different OS's? For example, converting ASCII to EBCIDIC. A.) Transport B.) Application C.) Physical D.) Session E.) Presentation F.) Network
Referring to the commands shown, what command must next be used on the branch router prior to traffic being sent to the router router?
Define ios?
Which three are typical operational phases in a basic connection oriented neloyord service? (Choose three) A. call setup B. data transfer C. load balancing D. call termination E. call priortization F. data segmentation G. data link identification
What are the ranges of private ips?
Identify 3 LAN technologies? A.) FDDI B.) HDLC C.) HSSI D.) X.25 E.) 802.3 F.) 802.5