When a Distance Vector routing protocol detects that a connected

network has gone down, it sends out a special routing update
packet,

telling all directly connected routers that the distance to
the dead

network is infinity. This is an example of which routing
technology?

A.) ICMP.

B.) Only Link State routing protocols have this intelligence.

C.) Triggered updates.

D.) Garrison-4.

E.) Split Horizon.

F.) Poison Reverse.



When a Distance Vector routing protocol detects that a connected network has gone down, it sends ..

Answer / guest

Answer: F

Instead of just removing the route from the routing update,
Poison

Reverse sets the distance to 'infinity' (for IP RIP this is
a hop count

of 16). This immediately makes the route invalid for all
neighboring

routers.

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCNA Interview Questions

Which is the protocol using multiple tcp/ip connections? SLIP or PPP

2 Answers   Sutherland,


Can you explain PPTP (Point-to-Point Tunneling Protocol)?

1 Answers   CCIE,


What does the Spanning Tree Algorithm (STA) do? A.) Restore lost frames B.) Builds routing tables for routing through an internetwork C.) Forward packets through a switch D.) STA is implemented by STP to prevent loops

2 Answers  


Which command should you use to create an IP standard access list? A. access-list standard 172.16.4.13 B. access-list 1 deny 172.16.4.13 0.0.0.0 C. access-list 100 deny 172.16.4.13 0.0.0.0 D. access-list 198 deny 172.16.4.13 255.255.255.255

3 Answers  


Which statement is true regarding full duplex? A.) Allows for transmission and receiving of data simultaneously B.) Only works in a multipoint configuration C.) Does not affect the bandwidth D.) Allows for transmission and receiving of data but not a the same time

2 Answers  






What does the Spanning Tree Algorithm (STA) do? A.) Restore lost frames B.) Builds routing tables for routing through an internetwork C.) Forward packets through a switch D.) STA is implemented by STP to prevent loops

1 Answers  


Which of the following encapsulation types can be used on leased-line connections? (Choose two) ❍ A. HDLC ❍ B. Frame Relay ❍ C. ISDN ❍ D. PPP

10 Answers   Wipro,


MIDI and MPEG are examples of what layer of the OSI seven layer model? A.) Session B.) Network C.) Datalink D.) Transport E.) Application F.) Presentation

4 Answers  


Assuming no subnetting, which two pieces of information can be derived from the IP address 144.132.25.10? (Choose two) A. It is a Class C address B. It is a Class B address C. The network address is 144.0.0.0 D. The network address is 144.132.25.0 E. The host spoon of the address is 25.10

2 Answers  


Suppose we have some switch in network and we are running RSTP how much convergence time will be there if one link down

0 Answers   Infosys,


How loops are introduced in switching? Whats the solution for that.

2 Answers   HCL,


what is the difference between dynamic NAT and NAT overload ? and how it works ?

4 Answers  


Categories