多項選擇題Which two statements about using the CHAP authentication mechanism in a PPP link are true?()

A. CHAP uses a two-way handshake
B. CHAP authentication periodically occurs after link establishment
C. CHAP has no protection from playback attacks
D. CHAP authentication is performed only upon link establishment
E. CHAP uses a three-way handshake
F. CHAP authentication passwords are sent in plaintext


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題the network administrator has been asked to give reasons for moving from ipv4 to ipv6. what are two valid reasons for adopting ipv6 over ipv4?()

A. telnet access does not require a password
B. nat
C. no broadcast
D. chanage of destination address in the ipv6 header
E. chanage of source address in the ipv6 header
F. autoconfiguration

2.多項選擇題Which three approaches can be used while migrating from an IPV4 addressing scheme to an IPV6 scheme.()

A. statically map IPV4 address to IPV6 addresses
B. configuration IPv4 tunnels between IPV6 islands
C. use DHCPv6 to map IPV4 addresses to IPV6 addresses
D. use proxying and translation to translate IPV6 packets into IPV4 packets
E. configure IPV6 directly
F. enable dual-stack routing

3.多項選擇題Which two subnetworks would be included in the summarized address of 172.31.80.0 /20?()

A.172.31.17.4/30
B.172.31.51.16/30
C.172.31.64.0/18
D.172.31.80.0/22
E.172.31.92.0/22
F.172.31.192.0/18

4.多項選擇題What two statistics appear in show frame-relay map output?()

A. The number of FECN packets that are received by the router
B. The number of BECN packets that are received by the router
C. The ip address of the local router
D. The value of the local DLCI
E. The status of the PVC that is configured on the router

5.多項選擇題It has become necessary to configure an existing serial interface to accept a second Frame Relay virtual circuit.Which of the following processes are required to accomplish this task?()

A. configure static frame relay map entries for each subinterface network.
B. remove the ip address from the physical interface
C. create the virtual interfaces with the interface command
D. configure each subinterface with its own IP address
E. disable split horizon to prevent routing loops between the subinterface networks
F. encapsulate the physical interface with multipoint PPP

6.多項選擇題Which two privileged mode cisco ios commands can be used to determine a cisco router chassis serial number?()

A.show inventory
B.show flash:filesys
C.dirflash:include chassis
D.show diag
E.show controllers

7.多項選擇題Which two statements are characteristics of a distance vector routing protocol?()

A. RIP is an example of distance vector routing protocols.
B. Updates are periodic and include the entire routing table.
C. Routing updates are sent only after topology changes
D. The protocol can be useful in hub-and-spoke and hierarchical networks.
E. Convergence is usually faster than with link state protocols
F. Each router has its own view of the topology

8.多項選擇題The network technician is planning to use the 255.255.255.224 subent mask on the network.which three valid IP addresses can the technician use for the hosts?()

A.172.22.243.127
B.172.22.243.191
C.172.22.243.190
D.10.16.33.98
E.10.17.64.34
F.192.168.1.160

9.多項選擇題A network administrator needs to configure port security on a switch.which two statements are true?()

A. The network administrator can apply port security to dynamic access ports
B. The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
C. The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
D. The network administrator can apply port security to EtherChannels.
E. When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

10.多項選擇題Which two statements apply to dynamic access lists?()

A. they offer simpler management in large internetworks.
B. you can control logging messages.
C. they allow packets to be filtered based on upper-layer session information.
D. you can set a time-based security policy.
E. they provide a level of security against spoofing.
F. they are used to authenticate individual users.

最新試題

Which command displays the CHAP authentication process as it occurs between two routers?()

題型:單項選擇題

At which layer of the OSI model is RSTP used to prevent loops?()

題型:單項選擇題

If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()

題型:單項選擇題

Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()

題型:單項選擇題

Which IPsec security protocol should be used when confidentiality is required?()

題型:單項選擇題

While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()

題型:單項選擇題

Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()

題型:單項選擇題

What is the purpose of the cisco Vlan Trunking protocol?()

題型:單項選擇題

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

題型:單項選擇題

On which options are standard access list based?()

題型:單項選擇題