ESAT Forouzan - Chapter 12: Point-to-Point Access (PPP) Flashcards
According to the PPP transition state diagram, exchange of user control and data packets occurs in the _____________ state.
a. Establishing
b. Authenticating
c. Networking
d. Terminating
c. Networking
According to the PPP transition state diagram, options are negotiated in the _______ state.
a. Establishing
b. Authenticating
c. Networking
d. Terminating
a. Establishing
According to the PPP transition state diagram, verification of user identification occurs in the _______state.
a. Establishing
b. Authenticating
c. Networking
d. Terminating
b. Authenticating
According to the PPP transition state diagram, the link is disconnected in the __________ state.
a. Establishing
b. Authenticating
c. Networking
d. Terminating
d. Terminating
In the PPP frame, the ________ field defines the contents of the data field.
a. Flag
b. Control
c. Protocol
d. FCS
c. Protocol
In the PPP frame, the ________ field is similar to that of the U-frame in HDLC.
a. Flag
b. Control
c. Protocol
d. FCS
b. Control
In the PPP frame, the _______ field has a value of 11111111 to indicate the broadcast address of HDLC.
a. Address
b. Control
c. Protocol
d. FCS
a. Address
In the PPP frame, the ________ field is for error control.
a. Flag
b. Control
c. Protocol
d. FCS
d. FCS
What is the purpose of LCP packets?
a. Configuration
b. Termination
c. Option negotiation
d. All of the above
d. All of the above
___________ is a three-way handshake for user verification.
a. PPP
b. CHAP
c. PAP
d. (b) and (c)
b. CHAP
A PAP packet and a CHAP packet can be distinguished by the value of the ________ field of the PPP frame.
a. Address
b. Control
c. Protocol
d. FCS
b. Control
PAP requires __________ and ___________ from the user.
a. A password; a calculated value
b. Authentication identification; a password
c. A challenge value; a password
d. Authentication identification; a calculated value
b. Authentication identification; a password
For CHAP authentication, the user takes the system’s ______ and its own _______to create a result that is then sent to the system.
a. Authentication identification; password
b. Password; challenge value
c. Password; authentication identification
d. Challenge value; password
d. Challenge value; password
___________, an (a) __________ protocol, establishes and terminates a network layer connection for IP packets.
a. NCP; IPCP
b. CHAP; NCP
c. IPCP; NCP
d. SLIP; PPP
c. IPCP; NCP