Most routing protocols recognize that it is never useful to send

information about a route back out the direction from which
the original

packet came. This is an example of which routing technology?

A.) Split Horizon

B.) LMI

C.) Triggered Updates

D.) Poison Reverse

E.) SYN, ACK

F.) DLCI



Most routing protocols recognize that it is never useful to send information about a route back o..

Answer / guest

Answer: A

The golden rule of Split Horizon: Do not send any update
packet back out

the same interface that it was received or learned from.
Poison Reverse

is typically used on larger networks, where a more
aggressive routing

loop solution is required.

Is This Answer Correct ?    0 Yes 1 No

Post New Answer

More CCNA Interview Questions

Identify 3 feature of access-lists? A.) Implicit deny will deny any packets not matched B.) Processed sequentially from bottom to top C.) Processed sequentially from top to bottom D.) If a packet is denied it would be tested against the remaining statements in the access-list E.) Once a match is made the packet is either denied or permitted F.) Enabled on all interfaces by default

1 Answers  


ccna syallabus and what is the mean by troubble shooting

2 Answers   IBM,


Can you define LAC

0 Answers   CCIE,


What do the following statements in an extended access list accomplish? access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21 access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20 access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255 A. This will block ftp traffic. B. This will block http traffic. C. This will permit ftp traffic. D. This will permit tftp traffic.

1 Answers  


take a pen and copy before solving that question there is a router name Ra there is two switch sw1 and sw2 sw1 is coneceted through fa0/1 interface of router Ra sw2 is conected through the fa1/1 serai interface of router s0/1 conected through the isp with it ip address 192.168.1.1 now therer are three host conexted through the sw1 and having ip host1=10.1.2.1 host2=10.1.2.2 host3=10.1.2.3 now there is also 3ree host conected through switch 2 i.e sw2 having ip host4=10.1.1.1 host 5=10.1.1.2 host 6=10.1.1.3 now i think u have made corect confrigation.now questios is started network admin configure the Ra router in that fassion Ra(config)#access-list 2 permit 10.1.1.0 0.0.0.255 Ra(config)#line vty 0 4 ra(config)#access-class 2 in now question is that why should network admnistratoe do it in this maneer A to give access sw1 host to acess internet B to prevent sw1 host from acessing comand promt c to prevent sw2 host from accessing console of router ra D to give sw2 host access to the enternet e prevent sw1 host from accessing internet f to prevent sw1 host from acessing the sw2 host network isp------(s0/1)..RA..(fa1/1)---SW2-host (4,5,6) | | (sw1)------host 1,2,3 this is not exect digarm but help to derive the diagram plz answer as soon as possible

6 Answers   AT&T,






Define the multicast routing?

0 Answers  


what is the major difference between EIGRP & IGRP?

9 Answers   Wipro,


Which command displays the IP addresses assigned to specific host names? A. show hosts B. show interface C. ping host name D. config host name E. show host mapping F. show host ip address G. trace ip addresses host name H. a partridge in a pear tree

2 Answers  


Tell me when we use extended access-list?

0 Answers  


What is the distance limitation for 100BaseT? A. 607 ft B. 25 Meters C. 1,000 ft D. 185 Meters

1 Answers  


Which IEEE standard is used to define Wi-Fi? A. IEEE 802.3 B. IEEE 802.5 C. IEEE 802.11h D. IEEE 802.11c E. IEEE 802.11

13 Answers   Infosys,


Which dynamic type draw back is, if single link down, it removes its routing table?

0 Answers  


Categories