With distance vector routing protocols, it is never useful
to send
the same routing update packet back out the same interface
that it was
learned. This concept is called what?
A.) Holddown timers
B.) Poison Reverse
C.) Count to infinity
D.) Split Horizon
E.) Link State
Answers were Sorted based on User's Feedback
Answer / guest
Answer: D
Split horizon is the concept of: 'Don't tell me what I just
told you.'
| Is This Answer Correct ? | 2 Yes | 0 No |
The concept is called Split Horizon.
It is used to avoid rooting loops in a network.
Basic principle is - "Information about routing path for a
particular packet is never sent back on the interface from
which it was received".
In simple sense, we can say "DON'T TELL ME WHAT I JUST TOLD YOU"
| Is This Answer Correct ? | 0 Yes | 0 No |
What command do we give if router IOS is stuck?
Which of the following protocols are used for logical network addressing? A.) IP B.) TCP C.) ARP D.) ICMP E.) RARP F.) BootP
Name a major component of the Point-to-Point Protocol (PPP) to negotiate and set up control options on the WAN data link. A.) RFC 1661 B.) High Level Datalink Protocol (HDLC) C.) Challenge Handshake Authentication Protocol (CHAP) D.) SS7 E.) Link Control Protocol (LCP)
What is the IEEE specification for Spanning Tree Protocol? A.) 802.9 B.) 803.ud C.) 803 D.) 802.1d
Which routing protocols uses connection-oriented routing updates? A.) IGRP B.) UDP C.) RIP D.) IP E.) BGP
Which layer is responsible for synchronizing sending and receiving applications? A.) Presentation B.) Session C.) Transport D.) Application E.) Network
What is a characteristic of Store and Forward switches? A.) They work at wire speed. B.) They are the same as Cut-Through switching in 'prune' mode. C.) They forward based on transport layer info. D.) They forward the frame before it is completely read. E.) They increase latency.
in stead of 0.0.0.0 wild card mask what u can write after ip?
Identify 3 ways in which a router can be configured? A.) TFTP B.) Nvram C.) ROM D.) Console E.) Trace
What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.
Which of the following are solutions to the problems encountered with Distance-Vector routing? A.) Defining a Maximum B.) Poison Reverse C.) Triggered Updates D.) Shortest path first algorithm. E.) Split Horizon
What do you understand by ‘protocol’ in networking?