In Novell's use of RIP, there are two metrics used to make

routing decisions. Select the two metrics.

A. Ticks.

B. Hops

C. Loops

D. Counts

Answers were Sorted based on User's Feedback

Answer / guest

Answer::A &B

It first uses ticks (which is about 1/18 sec.);

if there is a tie, it uses hops; if hops are equal, then it

uses an administratively assigned tiebreaker.

Is This Answer Correct ?    6 Yes 2 No

Answer / rajbir singh

A. Ticks.

B. Hops

Is This Answer Correct ?    1 Yes 1 No

Answer / dan



Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

How would you configure one host name that points to two IP addresses? A. IP host jacob B. IP jacob C. IP host jacob D. IP host duplicate "all"

1 Answers  

Identify the purpose of the TCP 3 step handshake? A.) Setup a un-reliable connection B.) Initialize routing tables C.) Synchronize sequence numbers between hosts D.) Connection tear down process

1 Answers  

Identify the 3 characteristics of IPX RIP? A.) Distance vector B.) Does not support multiple paths C.) 60 second updates D.) Default encapsulation is SAP E.) Uses ticks and hop count as a metric

2 Answers  

Which three devices can be used to convert the user data from the DTE into a form acceptable to the WAN service's facility? A. Modem B. CSU/DSU C. TA/NT1 D. CO E. SS7

1 Answers  

what is routing and routed protocol ?

7 Answers  

What does 'P' mean when running a Trace? A.) Good route B.) Protocol unreachable C.) Source Quench D.) Destination unreachable

2 Answers  

what is the distance betwwen link stae routing protocl and distance vector who have the best convergence toplogy eigrp conatain 3 table name them what the toplogy table contain

5 Answers   IBM,

What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS

1 Answers  

Where is the backup configuration file stored? A.) RAM B.) ROM C.) Console D.) NVRAM

1 Answers  

Which command can verify Application Layer connectivity between 2 hosts? A.) ftp B.) snmp C.) telnet D.) ping E.) traceroute

4 Answers   CTS,

Which three commands are used to configure information into RAM on a router? (Choose three) A. configure memory B. configure terminal C. configure overwrite D. copy tftp startup-config E. copy running-config startup-config F. copy startup-config running-config

8 Answers   HCL,

Identify the true statements about the following access list: Access-list 101 deny tcp any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host from telneting B.) This access list prevents any telnet traffic from subnet C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet E.) This access list is invalid F.) The netmask on the this access list is reversed

1 Answers   HCL,