What is true about Link-State protocols?
A.) They maintain a more complex table than distant vector
protocols
B.) They maintain a less complex table than distant vector
protocols
C.) They use routing ports
D.) The maintain backup copies of the IOS
Answers were Sorted based on User's Feedback
Answer / guest
Answer: A
Whereas the distance vector algorithm has non-specific
information about
distant networks and no knowledge of distant routers, a
link-state
routing algorithm maintains full knowledge of distant
routers and how
they interconnect.
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / chandan kumar sharma
They maintain a less complex table than distant vector
protocols
| Is This Answer Correct ? | 0 Yes | 1 No |
IP RIP routing is conferred on a router but not all interfaces attach to RIP networks. What should you use to prevent all RIP routing updates from being sent through selecedc interfaces without using access lists? A. passive route B. default routes C. passive interface D. route update filtering
Which company mange api's?
What is the difference between an igp and an egp?
Tell us the name of algorithm of eigrp protocol?
Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed
Which two of the following are valid ways to have multiple encapsulation types on a single interface? A.) This is not possible B.) subinterfaces C.) additional physical interfaces D.) secondary addresses
Identify the command to display the IP routing table? A.) show route B.) show ip route C.) show ip table route D.) show ipx route
Your company has been assigned the IP address of 201.222.5.0 and require having 20 subnets. As the company’s network administrator, find the following: a) the subnet mask (2 marks) b) the number of useable subnets (2 marks) c) the subnetwork address for the 4th subnet (2 marks) d) the first usable IP address for the 4th subnet (2 marks) e) the last usable IP address for the 4th subnet (2 marks) f) the broadcast address for the 4th subnet. (2 marks)
Name the 2 protocols are in wan technology?
Identify the purpose of ICMP? A.) Avoiding routing loops B.) Send error and control messages C.) Transporting routing updates D.) Collision detection
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
which utility should use to test whether TCP/IP has been initialized on a system.friends plz post the answer with explaination..