Identify the 2 rules used when configuring a Distance Vector
routing protocol?
A.) Physically connected network(s)
B.) Configure the classful address, no subnets
C.) Enable CDP so neighbors can be detected
D.) Configure all networks in Area0
Answer / guest
Answer: A B
When configuring a Distance Vector routing protocol only
assign the
physically connected networks with the classful address only.
Is This Answer Correct ? | 1 Yes | 1 No |
Define Poison Reverse? A.) To prevent regular update messages from reinstating a route that has gone down B.) Packets sent out that are not destined for a network go to the default network C.) Information received on an interface cannot be sent back out the same interface D.) When a network goes down, the router enters in its table the number 16 to signify destination unreachable
How do you find the parameters that you can use with the SHOW command? A.) ? show B.) show ? C.) debug show D.) help E.) sh?
Tell me when we use extended access-list?
Given the global configuration command 'banner motd #7 Hello #', what do the '#' symbols represent? A.) Escape sequence to exit the menu. B.) Nothing, just part of the banner. C.) Tic Tac Toe Macro. D.) Delimiting Character E.) Message border character. F.) Number of times message to be displayed.
Identify the purpose of the Ping command? A.) Share routing information with a neighbor router B.) Transmit user data when buffers are full C.) Test connectivity at layer 3 D.) Test entire protocol stack
Windowing is a type of? A.) Negative acknowledgement B.) Address resolution C.) Layer transition mechanism D.) Flow control
How many networks route update does a router recieves in RIP at once ?
Which command should you use to create an IP standard access list? A. access-list standard 172.16.4.13 B. access-list 1 deny 172.16.4.13 0.0.0.0 C. access-list 100 deny 172.16.4.13 0.0.0.0 D. access-list 198 deny 172.16.4.13 255.255.255.255
which device/card is used at the end of computer/device to connect multiple or different wire of mesh topology to a single computer/device?
1 Answers Adepto, British College, Wipro,
What is difference between standard and extended access-list
17 Answers College School Exams Tests, HCL, Wipro,
Which layer manages protocol access to the Network layer? A.) Datalink - MAC Sublayer B.) Datalink - LLC Sublayer C.) Transport D.) Session E.) Network
what is the matric of EIGRP protocol?