In Novell's use of RIP, there are two metrics used to make
routing decisions. Select the two metrics.
Answers were Sorted based on User's Feedback
Answer / guest
It first uses ticks (which is about 1/18 sec.);
if there is a tie, it uses hops; if hops are equal, then it
uses an administratively assigned tiebreaker.
|Is This Answer Correct ?||6 Yes||2 No|
Answer / rajbir singh
|Is This Answer Correct ?||1 Yes||1 No|
Answer / dan
|Is This Answer Correct ?||0 Yes||0 No|
How would you configure one host name that points to two IP addresses? A. IP host jacob 220.127.116.11 18.104.22.168 B. IP jacob 22.214.171.124 126.96.36.199 C. IP host jacob 188.8.131.52 D. IP host duplicate "all"
Identify the purpose of the TCP 3 step handshake? A.) Setup a un-reliable connection B.) Initialize routing tables C.) Synchronize sequence numbers between hosts D.) Connection tear down process
Identify the 3 characteristics of IPX RIP? A.) Distance vector B.) Does not support multiple paths C.) 60 second updates D.) Default encapsulation is SAP E.) Uses ticks and hop count as a metric
Which three devices can be used to convert the user data from the DTE into a form acceptable to the WAN service's facility? A. Modem B. CSU/DSU C. TA/NT1 D. CO E. SS7
what is routing and routed protocol ?
What does 'P' mean when running a Trace? A.) Good route B.) Protocol unreachable C.) Source Quench D.) Destination unreachable
what is the distance betwwen link stae routing protocl and distance vector who have the best convergence toplogy eigrp conatain 3 table name them what the toplogy table contain
What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS
Where is the backup configuration file stored? A.) RAM B.) ROM C.) Console D.) NVRAM
Which command can verify Application Layer connectivity between 2 hosts? A.) ftp B.) snmp C.) telnet D.) ping E.) traceroute
Which three commands are used to configure information into RAM on a router? (Choose three) A. configure memory B. configure terminal C. configure overwrite D. copy tftp startup-config E. copy running-config startup-config F. copy startup-config running-config
Identify the true statements about the following access list: Access-list 101 deny tcp 184.108.40.206 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 220.127.116.11 from telneting B.) This access list prevents any telnet traffic from subnet 18.104.22.168/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 22.214.171.124/24 E.) This access list is invalid F.) The netmask on the this access list is reversed