Novell's implementation of RIP updates routing tables every

____ seconds.

A. 60

B. 90

C. 10

D. 30

Answer / guest

Answer: A

Novell's RIP updates routing tables every 60

seconds, Apple's RTMP is every 10 seconds, routers ARP every

60 seconds, IGRP signal every 90 seconds,

and Banyan VINES signals every 90 seconds.

Is This Answer Correct ?    6 Yes 3 No

Post New Answer

More CCNA Interview Questions

Which layer manages protocol access to the Network layer? A.) Datalink - MAC Sublayer B.) Datalink - LLC Sublayer C.) Transport D.) Session E.) Network

3 Answers  

. Which command sequence will allow only traffic from network to enter interface s0? A. access-list 25 permit int s0 ; ip access-list 25 out B. access-list 25 permit int s0 ; ip access-group 25 out C. access-list 25 permit int s0 ; ip access-list 25 in D. access-list 25 permit int s0 ; ip access-group 25 in

1 Answers  

Using the TCP/IP protocol suite, a message is sent from host A to a destination IP address on the same LAN. How does host A determine the destination of a MAC address? A. It uses a proxy APP B. It uses APP requests C. It uses PARP requests D. It uses a router lookup table

1 Answers  

What is the Network Layer of the OSI responsible for? A.) Bridging B.) Routing packets through an internetwork C.) Regenerating the digital signal D.) Gateway services

3 Answers  

In regards to TCP/IP, which class of address allows for the fewest valid Internet hosts? A.) D B.) E C.) Classes are not used in TCP/IP. D.) B E.) C F.) A

1 Answers  

Which of the following are Transport layer protocols? A.) UDP B.) TCP C.) NBP D.) IP E.) SPX

3 Answers  

What are two functions of the ICMP protocol? (Choose two) A. to map IP addresses to Ethernet addresses B. to map common names to network addresses C. to forward SNMP alerts to management consoles D. to generate an echo reply in response to a ping test E. to send a host or pod unreachable message from a router to the source of an undeliverable packet

1 Answers  

What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.

1 Answers  

Identify the mode reflected by the following prompt 'Router'? A.) Setup B.) RXBoot C.) Boot mode D.) Privileged exec mode

2 Answers   Cisco,

What is masking? why is needed?

4 Answers  

When a Distance Vector routing protocol detects that a connected network has gone down, it sends out a special routing update packet, telling all directly connected routers that the distance to the dead network is infinity. This is an example of which routing technology? A.) ICMP. B.) Only Link State routing protocols have this intelligence. C.) Triggered updates. D.) Garrison-4. E.) Split Horizon. F.) Poison Reverse.

1 Answers  

The Cisco IOS is stored where? A.) ROM B.) CD C.) Flash D.) NVRAM

1 Answers