A. CHAP uses a two-way handshake
B. CHAP authentication periodically occurs after link establishment
C. CHAP has no protection from playback attacks
D. CHAP authentication is performed only upon link establishment
E. CHAP uses a three-way handshake
F. CHAP authentication passwords are sent in plaintext
您可能感興趣的試卷
你可能感興趣的試題
A. telnet access does not require a password
B. nat
C. no broadcast
D. chanage of destination address in the ipv6 header
E. chanage of source address in the ipv6 header
F. autoconfiguration
A. statically map IPV4 address to IPV6 addresses
B. configuration IPv4 tunnels between IPV6 islands
C. use DHCPv6 to map IPV4 addresses to IPV6 addresses
D. use proxying and translation to translate IPV6 packets into IPV4 packets
E. configure IPV6 directly
F. enable dual-stack routing
A.172.31.17.4/30
B.172.31.51.16/30
C.172.31.64.0/18
D.172.31.80.0/22
E.172.31.92.0/22
F.172.31.192.0/18
A. The number of FECN packets that are received by the router
B. The number of BECN packets that are received by the router
C. The ip address of the local router
D. The value of the local DLCI
E. The status of the PVC that is configured on the router
A. configure static frame relay map entries for each subinterface network.
B. remove the ip address from the physical interface
C. create the virtual interfaces with the interface command
D. configure each subinterface with its own IP address
E. disable split horizon to prevent routing loops between the subinterface networks
F. encapsulate the physical interface with multipoint PPP
最新試題
Which command displays the CHAP authentication process as it occurs between two routers?()
You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the max number of subnets.Which network address and subnet mask meet this requirement?()
Which statement is true, as relates to classful or classless routing?()
A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()
Which IPsec security protocol should be used when confidentiality is required?()
If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()
Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()
Three access ports have been installed and configured to a small office.What term defines the wireless topology?()
A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()
Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()