Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Why would you use static routing instead of dynamic routing?

A.) When you want automatic updates of the routing tables

B.) All the time

C.) When you have very few routes and want to conserve bandwidth

D.) When you have a gateway of last resort



Why would you use static routing instead of dynamic routing? A.) When you want automatic updates ..

Answer / guest

Answer: C

Static routes are typically used when there are very few
routes and you

want to conserve bandwidth. Since routing protocols are
constantly

sending their updates across the wire, it can cause a great
deal of

congestion.

Is This Answer Correct ?    12 Yes 1 No

Post New Answer

More CCNA Interview Questions

The Internet Control Message Protocol occurs at what layer of the seven layer model? A.) Physical B.) Transport C.) Session D.) Datalink E.) Presentation F.) Network

2 Answers  


How many types of ethernet?

0 Answers  


What do you use the Aux port for? A.) Console B.) Terminal editing C.) Modem D.) Backup logging

3 Answers  


Which of the following are examples of the Datalink Layer? A.) LLC B.) SQL C.) TCP D.) Token Ring E.) IP

2 Answers  


Which Standard IP Access list commands will deny only the source address 1.1.1.1? A.) access-list 9 deny host 1.1.1.1 B.) access-list 9 deny 1.1.1.1 255.255.255.0 C.) access-list 9 deny 1.1.1.1 0.0.0.0 D.) access-list 9 deny 1.1.1.1 0.255.255.255 E.) access-list 9 deny 1.1.1.1 255.255.255.255

5 Answers  


How do we do encryption and authentication in L2F?

0 Answers   CCIE,


What is the default IPX Ethernet encapsulation? A.) SNAP B.) Arpa C.) 802.2 D.) Novell-Ether E.) SAP

2 Answers  


Which of the following are logged when IP access list logging is enabled? A.) source address B.) protocol C.) source port D.) destination address E.) access list number F.) destination port

1 Answers  


Identify the keystroke to position the cursor to the beginning of a command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z

1 Answers  


What are the job opportunities i will get once i complete my CCNA certification.

2 Answers  


Identify the command to configure the IP address 172.16.100.5 255.255.255.0? A.) Router(config-if)# ip address 172.16.100.5 255.255.255.0 B.) Router(config)# ip address 172.16.100.5 C.) Router# ip address 172.16.100.5 255.255.255.0 D.) Router(config)# ip address 172.16.100.5 255.255.255.0

2 Answers  


Which command switches from User mode to Privileged mode? A.) login B.) privilege C.) admin D.) enable E.) enter F.) root

5 Answers  


Categories