Novell's implementation of RIP updates routing tables every
Answer / guest
Novell's RIP updates routing tables every 60
seconds, Apple's RTMP is every 10 seconds, routers ARP every
60 seconds, IGRP signal every 90 seconds,
and Banyan VINES signals every 90 seconds.
|Is This Answer Correct ?||6 Yes||3 No|
Which layer manages protocol access to the Network layer? A.) Datalink - MAC Sublayer B.) Datalink - LLC Sublayer C.) Transport D.) Session E.) Network
. Which command sequence will allow only traffic from network 18.104.22.168 to enter interface s0? A. access-list 25 permit 22.214.171.124 255.255.0.0 int s0 ; ip access-list 25 out B. access-list 25 permit 126.96.36.199 255.255.0.0 int s0 ; ip access-group 25 out C. access-list 25 permit 188.8.131.52 0.0.255.255 int s0 ; ip access-list 25 in D. access-list 25 permit 184.108.40.206 0.0.255.255 int s0 ; ip access-group 25 in
Using the TCP/IP protocol suite, a message is sent from host A to a destination IP address on the same LAN. How does host A determine the destination of a MAC address? A. It uses a proxy APP B. It uses APP requests C. It uses PARP requests D. It uses a router lookup table
What is the Network Layer of the OSI responsible for? A.) Bridging B.) Routing packets through an internetwork C.) Regenerating the digital signal D.) Gateway services
In regards to TCP/IP, which class of address allows for the fewest valid Internet hosts? A.) D B.) E C.) Classes are not used in TCP/IP. D.) B E.) C F.) A
Which of the following are Transport layer protocols? A.) UDP B.) TCP C.) NBP D.) IP E.) SPX
What are two functions of the ICMP protocol? (Choose two) A. to map IP addresses to Ethernet addresses B. to map common names to network addresses C. to forward SNMP alerts to management consoles D. to generate an echo reply in response to a ping test E. to send a host or pod unreachable message from a router to the source of an undeliverable packet
What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.
Identify the mode reflected by the following prompt 'Router'? A.) Setup B.) RXBoot C.) Boot mode D.) Privileged exec mode
What is masking? why is needed?
When a Distance Vector routing protocol detects that a connected network has gone down, it sends out a special routing update packet, telling all directly connected routers that the distance to the dead network is infinity. This is an example of which routing technology? A.) ICMP. B.) Only Link State routing protocols have this intelligence. C.) Triggered updates. D.) Garrison-4. E.) Split Horizon. F.) Poison Reverse.
The Cisco IOS is stored where? A.) ROM B.) CD C.) Flash D.) NVRAM