Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Can you explain PPTP (Point-to-Point Tunneling Protocol)?



Can you explain PPTP (Point-to-Point Tunneling Protocol)?..

Answer / muhammad junaid malik

The Point-to-Point Tunneling Protocol (PPTP) is a method for
implementing virtual private networks. PPTP uses a control
channel over TCP and a GRE tunnel operating to encapsulate
PPP packets

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCNA Interview Questions

What are the conversion steps of data encapsulation?

0 Answers  


What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet

3 Answers  


Which three devices can be used to convert the user data from the DTE into a form acceptable to the WAN service's facility? A. Modem B. CSU/DSU C. TA/NT1 D. CO E. SS7

1 Answers  


What is true when using DDR? A.) HDLC is the preferred encapsulation B.) You must use static routing C.) You should use dynamic routing D.) You should use ISDN

1 Answers  


1350 Value in which type of access-list?

0 Answers  


The Datalink Layer is broken down into 2 layers, LLC and MAC. The LLC establishes media independence and what else? A.) Provides Windowing. B.) Provides flow control. C.) Provides SAP's (Service Access Points). D.) The Datalink layer does not have sublayers. E.) Provides SAP's (Service Advertising Protocol). F.) RIP Updates.

2 Answers  


Which layer of the 7 layer model is responsible for representing the application information between 2 different OS's? For example, converting ASCII to EBCIDIC. A.) Transport B.) Application C.) Physical D.) Session E.) Presentation F.) Network

2 Answers  


Referring to the commands shown, what command must next be used on the branch router prior to traffic being sent to the router router?

0 Answers  


Define ios?

0 Answers  


Which three are typical operational phases in a basic connection oriented neloyord service? (Choose three) A. call setup B. data transfer C. load balancing D. call termination E. call priortization F. data segmentation G. data link identification

1 Answers  


What are the ranges of private ips?

0 Answers  


Identify 3 LAN technologies? A.) FDDI B.) HDLC C.) HSSI D.) X.25 E.) 802.3 F.) 802.5

2 Answers  


Categories