Identify the 2 rules used when configuring a Distance Vector

routing protocol?

A.) Physically connected network(s)

B.) Configure the classful address, no subnets

C.) Enable CDP so neighbors can be detected

D.) Configure all networks in Area0



Identify the 2 rules used when configuring a Distance Vector routing protocol? A.) Physically ..

Answer / guest

Answer: A B

When configuring a Distance Vector routing protocol only
assign the

physically connected networks with the classful address only.

Is This Answer Correct ?    1 Yes 1 No

Post New Answer

More CCNA Interview Questions

Define Poison Reverse? A.) To prevent regular update messages from reinstating a route that has gone down B.) Packets sent out that are not destined for a network go to the default network C.) Information received on an interface cannot be sent back out the same interface D.) When a network goes down, the router enters in its table the number 16 to signify destination unreachable

1 Answers   Google,


How do you find the parameters that you can use with the SHOW command? A.) ? show B.) show ? C.) debug show D.) help E.) sh?

1 Answers  


Tell me when we use extended access-list?

0 Answers  


Given the global configuration command 'banner motd #7 Hello #', what do the '#' symbols represent? A.) Escape sequence to exit the menu. B.) Nothing, just part of the banner. C.) Tic Tac Toe Macro. D.) Delimiting Character E.) Message border character. F.) Number of times message to be displayed.

1 Answers  


Identify the purpose of the Ping command? A.) Share routing information with a neighbor router B.) Transmit user data when buffers are full C.) Test connectivity at layer 3 D.) Test entire protocol stack

1 Answers  






Windowing is a type of? A.) Negative acknowledgement B.) Address resolution C.) Layer transition mechanism D.) Flow control

1 Answers   Redington,


How many networks route update does a router recieves in RIP at once ?

3 Answers   ComNet,


Which command should you use to create an IP standard access list? A. access-list standard 172.16.4.13 B. access-list 1 deny 172.16.4.13 0.0.0.0 C. access-list 100 deny 172.16.4.13 0.0.0.0 D. access-list 198 deny 172.16.4.13 255.255.255.255

3 Answers  


which device/card is used at the end of computer/device to connect multiple or different wire of mesh topology to a single computer/device?

1 Answers   Adepto, British College, Wipro,


What is difference between standard and extended access-list

17 Answers   College School Exams Tests, HCL, Wipro,


Which layer manages protocol access to the Network layer? A.) Datalink - MAC Sublayer B.) Datalink - LLC Sublayer C.) Transport D.) Session E.) Network

3 Answers  


what is the matric of EIGRP protocol?

0 Answers  


Categories