Identify the 2 rules used when configuring a Distance Vector
routing

protocol?

A.) Physically connected network(s)

B.) Configure the classfull address, no subnets

C.) Enable CDP so neighbors can be detected

D.) Same autonomous network



Identify the 2 rules used when configuring a Distance Vector routing protocol? A.) Physically..

Answer / guest

Answer: A D

Is This Answer Correct ?    3 Yes 0 No

Post New Answer

More CCNA Interview Questions

Identify the 2 commands that display the clock rate configured on the serial0 interface? A.) show serial0 B.) show interface serial0 C.) Show clock rate serial 0 D.) show controllers serial 0 E.) show running-config

1 Answers  


What command displays a summary list of OSPF interfaces that includes a column for the cost of each interface?

1 Answers  


What is the juncture at which the CPE ends and the local loop portion of the service begins? A. Demarc B. CO C. Local loop D. Last-mile

1 Answers  


Which router command allows you to view the entire contents of all access lists? A. Router# show interface B. Router> show ip interface C. Router# show access-list D. Router> show all access-list

3 Answers   jetking,


You are a system administrator and you want to deny access to a group of computers with addresses 172.30.16.0 to 172.30.31.0. Which wildcard mask would you use? A. 0.0.15.255 B. 0.0.255.255 C. 0.0.31.255 D. 0.0.127.255 E. 0.0.255.255

1 Answers  






Write the procedure for Router for configuring DHCP?

4 Answers  


Identify the command to configure the IP address 172.16.100.5 255.255.255.0? A.) Router(config-if)# ip address 172.16.100.5 255.255.255.0 B.) Router(config)# ip address 172.16.100.5 C.) Router# ip address 172.16.100.5 255.255.255.0 D.) Router(config)# ip address 172.16.100.5 255.255.255.0

2 Answers  


Explain what is the default behavior of access-list?

0 Answers  


If there is only 2 host in bus topology is that possible collision accord?

0 Answers  


What does the trace response !H mean? * A: Network unreachable * B: Not forwarded due to ACL restriction * C: Protocol unreachable * D: Port could not be reached

2 Answers  


The Internet Control Message Protocol occurs at what layer of the seven layer model? A.) Physical B.) Transport C.) Session D.) Datalink E.) Presentation F.) Network

2 Answers  


Can anyone explain the STP Security features. Just like BPDU guard, Root Guard. Hi JITENDERA, i m specially looking for u?????

2 Answers  


Categories