Which of the following are Distance Vector protocols?
A.) IGRP
B.) RIP
C.) OSFP
D.) EIGRP
Answers were Sorted based on User's Feedback
Answer / kingsly
IGRP and RIP are Distance vector protocol.OSPF is link-
state routing protocol,EIGRP is DUAL alogaritham .
| Is This Answer Correct ? | 3 Yes | 0 No |
what is ping utility and how to work.
What ISDN protocol specifies concepts, terminology, and services? A.) Q B.) S C.) I D.) E
How do areas benefit a link state inter network?
Which of the following encapsulation types can be used on leased-line connections? (Choose two) ❍ A. HDLC ❍ B. Frame Relay ❍ C. ISDN ❍ D. PPP
In how many ways you can access router?
You are given the following address: 128.16.32.13/30. Determine the subnet mask, address class, subnet address, and broadcast address. A. 255.255.255.252, B,128.16.32.12, 128.16.32.15 B. 255.255.255.252, C,128.16.32.12, 128.16.32.15 C. 255.255.255.252, B,128.16.32.15, 128.16.32.12 D. 255.255.255.248, B,128.16.32.12, 128.16.32.15
Which type of switching reads in the entire frame before forwarding it? A.) Pause-and -forward B.) Store-and-Forward C.) Inverse ARP D.) Fast Forward E.) Cut-Through F.) Routing
I received a call from client that network is down. We have 100 or 1000 of switches and routers so how could we find the client switch and its port number? and useful commands to find this ?
How we put NIC in promiscuous mode when using MS windows, can any one tell me in detail
You want to enable both arpa and snap encapsulation on one router interface. How do you do this? A. The interface can handle multiple encapsulation types with no extra configuration. B. Assign two network numbers, one for each encapsulation type. C. Enable Novell-ether to run multiple encapsulation types. D. Both arpa and snap are enabled by default so you don't have to configure anything.
What are the different ways authentication mechanism in VPN?
Identify 2 features of PPP PAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) More secure than CHAP D.) Remote node is control of authentication process