Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Which protocol will send a message to routers if a network
outage

or congestion occurs?

A.) ARP

B.) TCP

C.) IP

D.) ICMP



Which protocol will send a message to routers if a network outage or congestion occurs? A.) A..

Answer / guest

Answer: D

Internet Control Message Protocol - ICMP is a management
protocol and

messaging service provider for IP. Its messages are carried
as IP

datagrams.

ICMP is used in the following events:

Destination Unreachable - If a router cannot send an IP
packet any

further, it uses an ICMP echo to send a message back to the
sender

notifying it that the remote node is unreachable.

Buffer Full - If a routers memory buffer is full ICMP will
send out a

message to the originator.

Hops - Each IP datagram is assigned a path. This consists of
hops. If it

goes through the maximum number of hops, the packet is
discarded and the

discarding router sends an ICMP echo to the host.

Ping - Ping use ICMP echo message to check connectivity.

Is This Answer Correct ?    10 Yes 0 No

Post New Answer

More CCNA Interview Questions

Can you explain the basic of encryption in VPN?

0 Answers   CCIE,


What are the steps of conversion for data encapsulation?

0 Answers  


What are the steps of data encapsulation?

0 Answers  


Define network congestion?

0 Answers  


What causes a triggered update to reset the router hold-down timer?

0 Answers  


On which bas ospf take decision?

0 Answers  


what are the different asymmetric algorithms?

0 Answers   CCIE,


Hi, gys i am Hasnain alamI want to get certification how do it ? please sugges me.

1 Answers   IBM,


Which of the following is a valid TCP/IP socket for an Email connection? 101.34.2.125:25 00-00-03-1B-CA-6F:143 202.167.23.101:21 60.4:110

2 Answers  


R1#sh ip nat translations Pro Inside global Inside local Outside local Outside global icmp 15.1.1.1:11 10.1.1.1:11 30.1.1.1:11 30.1.1.1:11 icmp 15.1.1.1:12 10.1.1.1:12 20.1.1.1:12 20.1.1.1:12 icmp 15.1.1.1:13 10.1.1.1:13 21.1.1.1:13 21.1.1.1:13 icmp 15.1.1.1:14 10.1.1.1:14 31.1.1.1:14 31.1.1.1:14 R1# So my question is that after every ip address [:] is used & some number. 15.1.1.1{:11}... what is this colon & number indicate. Can anyone tel me this..!!! Thanking you advance. Shahin

4 Answers  


What is size of ipv4 mac address?

0 Answers  


Identify the purpose of the TCP 3 step handshake? A.) Setup a un-reliable connection B.) Initialize routing tables C.) Synchronize sequence numbers between hosts D.) Connection tear down process

1 Answers  


Categories