What is the maximum hop count for IP RIP?
A.) Infinity
B.) 16
C.) 15
D.) 1
Answers were Sorted based on User's Feedback
Answer / guest
Answer: C
15 is the maximum hop count, underscoring the size
limitation of RIP.
| Is This Answer Correct ? | 62 Yes | 4 No |
Answer / mukesh kumar
Answer
(C) Router maximum hop count is 15.
| Is This Answer Correct ? | 18 Yes | 0 No |
What metric does rip use? How is the metric used to indicate an unreachable network?
I received a call from client that network is down. We have 100 or 1000 of switches and routers so how could we find the client switch and its port number? and useful commands to find this ?
As a system administrator, you want to debug igrp but are worried that the "debug IP igrp transaction" command will flood the console. What is the command that you should use? A. debug IP igrp event B. debug IP igrp-events C. debug IP igrp summary D. debug IP igrp events
An autonomous system can only exist if all routers in that system meet which criteria? A. interconnected B. run the same routing protocol C. assigned same autonomous system number D. run IGRP only E. run RIP only
Which of the following protocols are used to get an IP address from a known MAC address? A.) BootP B.) TCP C.) IP D.) ARP E.) RARP F.) ICMP
HI ALL , wanted to know if the rstp protocol.. rapid spanning tree protocol .. is imp to study with ccna's point of view or study of STP will be enough.. in some books rstp is nt given like todd lamle however in icnd2 its explained in detail.. please suggest asap .. thanks ..
What is the administrative distance for RIP? A.) 100 B.) 90 C.) 120 D.) 110
Identify 3 characteristics of a connection oriented protocol? A.) Path determination B.) Flow control C.) Acknowledgements D.) Uses hop count as metric E.) 3 step handshake
How IEEE Calculate the Cost of Link (ex.. 10mbps is having Cost 100) Is there any formula or any test to calculate it.
Which OSI layer incorporates the MAC address and the LLC? A.) Data link B.) Network C.) Physcial D.) Transport
What do the following commands accomplish? access-list 1 deny 172.16.4.0 0.0.0.255 access-list 1 permit any interface ethernet 0 IP access-group 1 out A. This will block traffic from subnet 172.16.4.0 and allow all other traffic. B. This will allow traffic from subnet 172.16.4.0 and block all other traffic. C. All traffic is allowed. D. All traffic is blocked.
4. What is a disadvantage to using bridges in your network? A. Filters by MAC address B. Stops broadcast storms C. Doesn't stop broadcast storms D. Can only use up to 4 bridges in any LAN