Identify the 3 characteristics of IPX RIP?

A.) Distance vector

B.) Does not support multiple paths

C.) 60 second updates

D.) Default encapsulation is SAP

E.) Uses ticks and hop count as a metric

Answers were Sorted based on User's Feedback



Identify the 3 characteristics of IPX RIP? A.) Distance vector B.) Does not support multiple p..

Answer / guest

Answer: A C E

Is This Answer Correct ?    2 Yes 0 No

Identify the 3 characteristics of IPX RIP? A.) Distance vector B.) Does not support multiple p..

Answer / sanjeev kumar

Answer A C E

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCNA Interview Questions

hi everybody anybody have doubts in ccna please contact with me we will provide the solutions of the networking questions.my contact no. is 9885382098,abdulkhalid.5@gmail.com.

2 Answers  


Which three functions are supported by connection oriented servkps? (Choose three) A. connection parameters are synchronized B. any loss or duplication of packets can be corrected C. the data packet is independently routed and the service does not guarantee the packet will be processed in order D. a data communication path is established between a requesting entity and the peer device on the remote end system

1 Answers  


What is the default encapsulation of Netware 3.12? A.) Ethernet_II B.) 802.5 C.) 802.2 D.) 802.3

1 Answers  


Which memory component on a Cisco router contains the dynamic system configuration? ROM NVRAM Flash RAM/DRAM

17 Answers   HCL, Sun TV,


You are a network administrator and have been assigned the IP address of 201.222.5.0. You need to have 20 subnets with 5 hosts per subnet. What subnet mask will you use? A. 255.255.255.248 B. 255.255.255.128 C. 255.255.255.192 D. 255.255.255.240

2 Answers  






hi i have some difficulty plz reply as s0on as possible. 1 what is csma/cd(i know u are familer with that protocol) 2 what is the need for it and and 3 rd one in which i need help how to enable csma/cd at router or switches shain make it answer as sson as possibele and call me afetr reply thanks jitendera kuamr sinha

1 Answers  


What is the first step in data encapsulation? A.) User information is converted into data. B.) Frames are put into bits. C.) Data is converted into segments. D.) Segments are converted into datagrams and packets. E.) Packets are put into logical frame.

1 Answers  


What was the key reason the International Organization for Standardization released the OSI model? A. users could access network servers faster B. different vendor networks could work with each other C. the industry could create a standard for how computers work D. network administrators could increase the overall speed of their network

1 Answers  


What is ping utility?

0 Answers  


What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer

1 Answers  


What protocols can you use while testing Trace? A.) DECnet B.) CLNS C.) IP D.) Old Vines E.) Vines F.) Chaos

1 Answers  


Access lists are numbered. Which of the following ranges could be used for an IP access list? A. 600 - 699 B. 100 - 199 C. 1 - 99 D. 800 - 899 E. 1000 - 1099

1 Answers  


Categories