Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is the routing metric used by IGRP?

A.) MTU, delay, bandwidth, reliability, and loading

B.) Count to infinity

C.) TTL

D.) Hop count



What is the routing metric used by IGRP? A.) MTU, delay, bandwidth, reliability, and loading B..

Answer / guest

Answer: A

IGRP is a distance vector routing protocol designed by
Cisco. The

maximum hop count is 255, and it uses a combination of
variables to

determine a composite metric. IGRP has an administrative
distance of 100.

Is This Answer Correct ?    5 Yes 0 No

Post New Answer

More CCNA Interview Questions

Urgent reply plz donot have time to serch on google plz reply the questions is how to remove newfolder.exe virus from my windows 2003 server i have all ready tried quick heal.spy hunter mcafee server . plz reply

4 Answers  


Which global configuration command will tell the router to load the IOS file 'IOS_filename' from the Network File server at 1.2.3.4 during the next boot? A.) boot system flash IOS_filename 1.2.3.4 B.) boot system tftp IOS_filename 1.2.3.4 C.) config-register 0x0 1.2.3.4 D.) boot system rom 1.2.3.4 E.) This can not be done, only the first file in flash can be used.

1 Answers  


Cisco routers can secure the enable password with a one-way hash algorithm. What command would encrypt the enable password with the strong encryption method? A.) enable encrypt john B.) password john C.) enable secret john D.) enable password john E.) secret john F.) enable password 5 john

1 Answers  


To monitor ipx traffic on a network, what command would you use? A. debug ipx transaction B. show ipx traffic C. show ipx events D. display ipx traffic

3 Answers  


Which protocol resolves an IP address to a MAC address? A.) DHCP B.) RARP C.) ARP D.) NBP E.) DNS

3 Answers  


Which of the following is an example of the Session Layer? A.) TCP B.) SQL C.) IP D.) X-Windows E.) Token Ring F.) LLC

2 Answers  


Your network uses a Class C address of 210.10.10.0. You must now split up the network into separate shores to handle multiple buildings separated by routers. Which two steps must you take to determine the proper shored mask for your networks? (Choose two) A. determine the number of seperate networks required B. determine how many devices will require DHCP addressing C. determine the maximum number of hosts that will be on each shored D. determine the miniumum number of hosts that will be on each shored E. determine which router will be the IP default gateway for each shored

1 Answers  


What are the different IPX access lists?

0 Answers  


Your PC has been configured with IP Address 192.168.3.25 and a subnet mask of 255.255.255.0. Which of the following IP Addresses is a valid default gateway address for your PC? 192.168.3.0 255.255.255.0 192.168.3.2 255.255.255.0 192.168.3.25 255.255.255.0 192.168.4.1 255.255.255.255

2 Answers  


What is the different between console port and auxiliary port?

0 Answers  


What are the protocols that are used by every layer of ip/tcp model?

0 Answers  


If bandwidth will increase what will happen?

0 Answers  


Categories