chap 3 exam Flashcards

1
Q

How does PPP interface with different network layer protocols?

A

by using separate NCPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which three physical layer interfaces support PPP

A

synchronous serial
HSSI
asynchronous serial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3 types of LCP frames used with PPP

A

link-termination frames
link-maintenance frames
link-establishment frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which protocol will terminate the PPP link after the exchange of data is complete?

A

LCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

three statements are true about PPP?

A

PPP uses LCPs to agree on format options such as authentication, compression, and error detection

  • PPP can use synchronous and asynchronous circuits.
  • PPP uses LCPs to establish, configure, and test the data link connection.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network engineer is troubleshooting the loss of MPEG video viewing quality as MPEG video files cross a PPP WAN link. What could be causing this loss of quality?

A

The compress command was used when PPP was configured on the interfaces.
–Using the compress command when configuring PPP on interfaces can reduce the system performance due to a software compression process. The reduced performance may reduce the content delivery quality, especially in the case of audio and video streaming, such as MPEG file streaming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which three statements are true about PPP? (Choose three.)

A

PPP uses LCPs to establish, configure, and test the data link connection.

  • PPP uses LCPs to agree on format options such as authentication, compression, and error detection.
  • PPP can use synchronous and asynchronous circuits.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the steps of PPP CHAP authentication process?

A

1- use LCP to negotiate the type of authentication, calculatethe id and random number, calculate the MD5 hash, send challenge id hash and username. , calculate hash besed on received info and finally compare the received hash with calculated hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly