WAN 2

Descrição

Quiz sobre WAN 2, criado por Del Sutton em 23-04-2015.
Del Sutton
Quiz por Del Sutton, atualizado more than 1 year ago
Del Sutton
Criado por Del Sutton mais de 9 anos atrás
48
0

Resumo de Recurso

Questão 1

Questão
Check the protocols and statements that relate correctly to PPP
Responda
  • • IP Connection Protocol (IPCP) is responsible for the transporting of TCP and UDP sessions across the PPP link and the verification of the successful interconnection. IPCP packet may not be exchanged until PPP has reached the Network-Layer may not be exchanged until PPP has reached this phase is reached should be silently discarded.
  • • Layer Connection Protocol(LCP) is used to automatically agree upon the encapsulation format options, handle varying limits on sizes of packets, detect a looped-back link and other common miss configuration errors, and terminate the link. Other optional facilities provided are authentication of the identity of its peer on the link, and determination when a link is functioning properly and when its failing.
  • • Link Control Protocol(LCP) is used to automatically agree upon the encapsulation format options, handle varying limits on sizes of packets, detect a looped-back link and other common miss configuration errors, and terminate the link. Other optional facilities provided are authentication of the identity of its peer on the link, and determination when a link is functioning properly and when its failing.
  • • IP Control Protocol(IPCP) is responsible for configuring, enabling and disabling the IP protocol modules on both ends of the point-to-point link. IPCP uses the same packet exchange mechanism as the Link Control Protocol(LCP). IPCP packets may not be exchanged until PPP has reached the Network-Layer Protocol phase. IPCP packets received before this phase is reached should of silently discarded.
  • • Password Authentication Protocol (PAP) is an authentication protocol that requires users to enter a password before accessing a secure system. The user’s name and password are sent over the wire to a server, where they are compared with a database of user account names and passwords. This technique is vulnerable to wiretapping (sniffing) because the password can be captured and use b
  • • Challenge Handshake Authentication Protocol (CHAP) is a type of authentication in which the authentication agent sends the client program a random value that is used only once and an ID value. Both the sender and peer share a predefined secret. The peer calculates a one-way hash using MD5 on the random value. The hash value is sent to the authenticator, which in turn builds that same string on its side, calculates the MD5 sum and compares the result with the value received from the peer. If the values match, the peer is identified.

Questão 2

Questão
Select the data link layer protocols that use HDLC as their basic frame structure.
Responda
  • Frame Relay
  • Ethernet
  • LAP-D
  • Q 921
  • PPP
  • RADIUS
  • IP
  • ATM

Questão 3

Questão
The ____ is the frame relay virtual circuit number (with local significance) which corresponds to a particular destination.
Responda
  • DLCI
  • DICL
  • DCLI

Questão 4

Questão
What is a DLCI
Responda
  • Frame Relay Term for Data Link Control identifier. It is a number which identifies a circuit which is terminated by Q. 931
  • ISDN Term for Data Link Connection identifier. It is a number which identifies a circuit which is terminated by Q. 931
  • Frame Relay Term for Data Link Control identifier. It is a number which identifies a private (PVC) or switched virtual circuit (SVC) in a Frame Relay network
  • Frame Relay Term for Data Link Connectionl identifier. It is a number which identifies a private (PVC) or switched virtual circuit (SVC) in a Frame Relay network

Questão 5

Questão
Unnumbered Serial Interfaces apply to interfaces that have yet to be configured.
Responda
  • True
  • False

Questão 6

Questão
In Frame Relay routers learn the data-link connection identifiers (DLCIs) they need to use from the Frame Relay switch via ___ updates. The routers then Inverse ARP for the remote IP address and create a mapping of local DLCIs and their associated remote IP addresses or a local mapping is manually configured.
Responda
  • LMI
  • LIM
  • BBC
  • ATM

Questão 7

Questão
The following two commands input on a serial interface with Frame Relay Encapsulation achieve the same result, true or false ? (config-if)# frame-relay map ip 191.200.210.2 11 broadcast or (config-if)# frame-relay inverse-arp
Responda
  • True
  • False

Questão 8

Questão
HDLC is the abbreviation for what and what purpose does it serve ?
Responda
  • High-Level Data Link Connection (HDLC) - Default encapsulation type on multipoint networks.
  • High-Level Data Link Control (HDLC) - Default encapsulation type on multipoint networks.
  • High-Level Data Link Control (HDLC) - Default encapsulation type on point-to-point, dedicated links, and circuit switched connections.
  • High-Level Data Link Connection (HDLC) - Default encapsulation type on point-to-point, dedicated links, and circuit switched connections.

Questão 9

Questão
Select the valid authentication methods within PPP
Responda
  • PAP
  • EAP
  • RADIUS
  • CHAP

Questão 10

Questão
What is the function of LMI in Frame Relay.
Responda
  • LMI (Local Management Interface) maps VC's to their corresponding switches.
  • LMI (Local Mapping Interface) maps VC's to their corresponding switches.
  • LMI (Local Management Interface) provides message information about current DLCI values (global or local significance), and the status of virtual circuits.
  • LMI (Local Mapping Interface) provides message information about current DLCI values (global or local significance), and the status of virtual circuits.

Semelhante

Matemática - Triângulos
Alessandra S.
Simulado Fuvest
Alessandra S.
16 Dicas para o Professor Criativo
Alessandra S.
Como Transformar Mapas Mentais em Suporte
Alessandra S.
AFO - Administração Financeira Orçamentária
fe.r.m
Glossário de Biologia
GoConqr suporte .
Practice For First Certificate Grammar II
titaleoni
Reino Monera
nathaliaires
13 motivos para usar a Tecnologia na Educação
André Matias
Lei n° 6.680 - Estatuto dos Militares
Alan Amanthea
Técnica Feynman
vivi sousa