As the system administrator, you type "ppp authentication
chap pap
secret". Which authentication method is used first in
setting up a session?
A. secret
B. PAP
C. CHAP
D. PPP/SLIP
Identify the administrative distance and appropriate routing protocol? A.) RIP = 255, IGRP = 100 B.) RIP = 100, IGRP = 120 C.) RIP = 1, IGRP = 0 D.) RIP = 120, IGRP = 100
Two of the protocols that can be carried in the Protocol field of an IP packet are? A. TCP B. UDP C. FTP D. TFTP
Identify the purpose of the wildcard mask? A.) Match a certain portion of the IP address while ignoring the rest of the address B.) Determine the class of the IP address C.) Determine the network portion of an IP address D.) Hide the host portion of an IP address
Which port numbers are used by TCP and UDP to set up sessions with other hosts? A.) 1024 and above B.) 6 and 17 respectively C.) 1-25 D.) 6-17
What is a benefit of a virtual LAN (VLAN)? A. It increases the number of broadcast domains B. It decreases the number of broadcast domains C. It increases the numberr of collision domains D. It decreases the number of collision domains E. Since it is a vitual Interface it never shuts down
How does Hold-downs work?
Identify the type of routing protocol that exchanges entire routing tables at regular intervals? A.) Link state B.) Interior gateway protocols C.) Appletalk routing D.) Distance vector
Which can be true regarding VLANs? A.) They are created by location B.) They are created by function C.) They are created by department D.) They are created by group
Which protocol resolves an IP address to a MAC address? A.) DHCP B.) RARP C.) ARP D.) NBP E.) DNS
To monitor IP igrp traffic, you can use "debug IP igrp transaction" or "debug IP igrp events". How do you display information about IPX routing update packets? A. debug routing B. debug ipx transaction C. debug ipx routing activity D. debug ipx events
Can you explain CHAP?
Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity