Name a major component of the Point-to-Point Protocol (PPP) to
negotiate and set up control options on the WAN data link.
A.) RFC 1661
B.) High Level Datalink Protocol (HDLC)
C.) Challenge Handshake Authentication Protocol (CHAP)
D.) SS7
E.) Link Control Protocol (LCP)
Answers were Sorted based on User's Feedback
Answer / guest
Answer: E
LCP negotiates many of the PPP settings during call setup.
| Is This Answer Correct ? | 2 Yes | 0 No |
Identify the 3 major functions at layer 3 of the OSI model? A.) Forwarding process B.) Logical addressing C.) End-to-end connections D.) Path selection E.) MAC address examination F.) Network monitoring
in router we use config# ip host router2 ipaddress we use it for ping the neighbor router using name provided by us ..........instead of ip address in this max how many ip address can be assigned thanks
Which frame has a Type field to identify the upper-layer protocol? A.) 802.3 B.) 802.2 C.) 802.5 D.) Ethernet_II
Why is UDP lease favored when compared to TCP?
What is the second best path name of eigrp?
Explain the types of communication in ipv4?
EIGRP send query reply & Acknowledgment on which address ?
Dear Mr. JITENDERA KUAMR SINHA how are and how is your family? Anyway can u send me your personal email address?
Which two statements about integrated services digital network (ISDN) are true? A. ISDN provides data only capability B. ISDN provides an integrated voice/data capability C. The ISDN standards define the hardware and call setup schemes for end the end digital connectivity D. Users receive more bandwidth on WANS with a leased lin of 56 Cops than with multiple B channels
Can you explain the basic of encryption in VPN?
Most routing protocols recognize that it is never useful to send information about a route back out the direction from which the original packet came. This is an example of which routing technology? A.) Split Horizon B.) LMI C.) Triggered Updates D.) Poison Reverse E.) SYN, ACK F.) DLCI
The -- terminal no editing -- command will perform what function? A.) Edit the contents of NVRAM B.) Allows access to the terminal port C.) Stops the advanced editing feature D.) Enable password functions