Explain how an spf algorithm works?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

What command displays a summary list of OSPF interfaces that includes a column for the cost of each interface?

1 Answers  


Which statement about Ethernet switches is true? A. Symmetric switching allows connection between pods of unlike bandwidth and does not require memory buffering B. Memory Buffering is used to prevent a bottleneck when pods of different bandwidth are connected on a symmetric switch C. The latency can be reduced if the switch utilizes the store and forward method of switching store and forward is better for error detection D. The cut through method of switching is faster because the switch forwards the packet to the destination as soon as it reads the destination address

1 Answers  


what is the difference between client mode and server mode of vtp and what is the diffrence betwwen tarnsparent mode and server mode

7 Answers   Bhel, IBM,


Windowing is a type of : A.) Negative acknowledgement B.) Address resolution C.) Layer transition mechanism D.) Flow control

1 Answers  


What is proxy-ARP and how it is used and configured

1 Answers  






The Cisco IOS is stored in: A.) ROM B.) CD C.) Flash D.) NVRAM

5 Answers  


Which OSI layer establishes, maintains and terminates sessions between applications? A.) Application B.) Physical C.) Data-Link D.) Presentation E.) Network F.) Session

2 Answers  


Identify the switching method that examines the destination MAC address as the frame is being received then begins forwarding the frame prior to receiving the entire frame? A.) Fragment-free B.) Store and Forward C.) Cut-through D.) Fast forward

2 Answers  


Hello Every one. Can anyone please explain me the 7 OSI Layers with some general example? I am trying to learn it from last few months but i cant i realy need it. Thanks

2 Answers  


Identify the command to view the configuration-register value? A.) show register B.) display config-register C.) show config D.) show version

1 Answers  


Most routing protocols recognize that it is never useful to send information about a route back out the direction from which the original packet came. This is an example of which routing technology? A.) Split Horizon B.) LMI C.) Triggered Updates D.) Poison Reverse E.) SYN, ACK F.) DLCI

1 Answers  


Identify the purpose of the wildcard mask? A.) Match a certain portion of the IP address while ignoring the rest of the address B.) Determine the class of the IP address C.) Determine the network portion of an IP address D.) Hide the host portion of an IP address

3 Answers  


Categories