In Novell's use of RIP, there are two metrics used to make
routing decisions. Select the two metrics.
A. Ticks.
B. Hops
C. Loops
D. Counts
Answers were Sorted based on User's Feedback
Answer / guest
Answer::A &B
It first uses ticks (which is about 1/18 sec.);
if there is a tie, it uses hops; if hops are equal, then it
uses an administratively assigned tiebreaker.
| Is This Answer Correct ? | 6 Yes | 2 No |
What is difference between baseband and broadband transmission in ccna?
Which layer hides details of network dependent information from the higher layers by providing transparent data transfer? A.) Transport B.) Physical C.) Data Link D.) Session E.) Application F.) Network
Hi all, suppose more than two network administrators are configure same router with different configuration through telnet at the same time.. then whose(admin's) configuration will use router for routing ?
Which type of switching is considered to be 'wire speed?' A.) Cut-Through B.) Multiplexed C.) Inverted D.) Layer 4 E.) Store and Forward F.) Layer 3
What is the purpose of a data link?
Which protocol will send a message to routers if a network outage or congestion occurs? A.) ARP B.) TCP C.) IP D.) ICMP
Who controls mac address uniqueness and how?
If you have configured IPX on a Serial interface, which command would display the IPX network and node address on the Serial 1 interface? A.) show interface B.) show ipx s1 C.) show interface s1 D.) show ipx int serial 1 E.) show ipx int brief
Which can be logged by IPX extended access lists? A.) source address B.) protocol C.) source socket D.) access list number E.) destination socket F.) destination address
Identify the command to configure ALL the default VTY ports? A.) Router(config)# line vty 0 4 B.) Router# line vty 0 4 C.) Router(config)# line vty D.) Router(config)# line vty 0
What is the subnetmask of / 27 in network based and host based?
When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised