In Novell's use of RIP, there are two metrics used to make

routing decisions. Select the two metrics.

A. Ticks.

B. Hops

C. Loops

D. Counts




Answers were Sorted based on User's Feedback



Answer / guest

Answer::A &B

It first uses ticks (which is about 1/18 sec.);

if there is a tie, it uses hops; if hops are equal, then it

uses an administratively assigned tiebreaker.

Is This Answer Correct ?    6 Yes 2 No

Answer / rajbir singh

A. Ticks.

B. Hops

Is This Answer Correct ?    1 Yes 1 No

Answer / dan

B

D

Is This Answer Correct ?    0 Yes 0 No



Post New Answer



More CCNA Interview Questions

How would you configure one host name that points to two IP addresses? A. IP host jacob 1.0.0.5 2.0.0.8 B. IP jacob 1.0.0.5 2.0.0.8 C. IP host jacob 1.0.0.5 D. IP host duplicate "all"

1 Answers  


Identify the purpose of the TCP 3 step handshake? A.) Setup a un-reliable connection B.) Initialize routing tables C.) Synchronize sequence numbers between hosts D.) Connection tear down process

1 Answers  


Identify the 3 characteristics of IPX RIP? A.) Distance vector B.) Does not support multiple paths C.) 60 second updates D.) Default encapsulation is SAP E.) Uses ticks and hop count as a metric

2 Answers  


Which three devices can be used to convert the user data from the DTE into a form acceptable to the WAN service's facility? A. Modem B. CSU/DSU C. TA/NT1 D. CO E. SS7

1 Answers  


what is routing and routed protocol ?

7 Answers  


What does 'P' mean when running a Trace? A.) Good route B.) Protocol unreachable C.) Source Quench D.) Destination unreachable

2 Answers  


what is the distance betwwen link stae routing protocl and distance vector who have the best convergence toplogy eigrp conatain 3 table name them what the toplogy table contain

5 Answers   IBM,


What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS

1 Answers  


Where is the backup configuration file stored? A.) RAM B.) ROM C.) Console D.) NVRAM

1 Answers  


Which command can verify Application Layer connectivity between 2 hosts? A.) ftp B.) snmp C.) telnet D.) ping E.) traceroute

4 Answers   CTS,


Which three commands are used to configure information into RAM on a router? (Choose three) A. configure memory B. configure terminal C. configure overwrite D. copy tftp startup-config E. copy running-config startup-config F. copy startup-config running-config

8 Answers   HCL,


Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed

1 Answers   HCL,




Categories