Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is the routing algorithm used by RIP and IGRP?

A.) OSPF

B.) Link-state

C.) Dynamic

D.) Distance Vector

Answers were Sorted based on User's Feedback



What is the routing algorithm used by RIP and IGRP? A.) OSPF B.) Link-state C.) Dynamic ..

Answer / guest

Answer: D

Is This Answer Correct ?    4 Yes 1 No

What is the routing algorithm used by RIP and IGRP? A.) OSPF B.) Link-state C.) Dynamic ..

Answer / guest

D

Is This Answer Correct ?    3 Yes 2 No

What is the routing algorithm used by RIP and IGRP? A.) OSPF B.) Link-state C.) Dynamic ..

Answer / mrkx

answer is C

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCNA Interview Questions

An optional parameter on an IPX access is the 'LOG' parameter. This records access-list violations when a packet matches. What else does the 'LOG' option do? A.) Records the number of times that a packet matches the list. B.) Return a message to user who is denied access the by list. C.) Notifies an SNMP Agent. D.) Saves the log to NVRAM. E.) Send an SNMP Trap.

1 Answers  


what is prefix list

0 Answers   Infosys,


8. When is Frame Tagging used? A. When you install repeaters in your network B. When you install bridges in your network C. When you install routers in your network D. When you use Switches configured with multiple VLANS

5 Answers  


Identify the statement which connects access-list 101 inbound to interface e0? A.) Router(config-if)# ip access-group 101 in B.) Router(config-if)# ip access-group 101 C.) Router(config)# ip access-group 101 e0 in D.) Router(config)# ip access-group 101 e0 in

1 Answers  


Identify the prompt displayed if in privileged exec mode? A.) Router(config)# B.) Router# C.) Router> D.) Router(priv)#

2 Answers  


Which three types of connectors are commonly associated with Cisco's V.35 serial cables? (Choose three.) 0 RJ 11 1 DB 60 2 Winchester 15 pin 3 DB 9 4 smart serial 5 RJ 45

6 Answers  


What is the protocol and what is the second part of the following network address? 172.16.0.254 mask - 255.255.0.0 A. IPX MAC address B. IP Class C directed broadcast C. Private IP address node number D. Public IP directed broadcast E. Private IP directed broadcast

1 Answers  


What is the simplest way to remotely configure a router?

0 Answers  


How to see the running-config & startup-config infor from global configuration mode. As we know, from priviledge mode we cn see it by executing command. i.e. Router#show running-config and Router#show startup-config Now wat is the coommands use in global configuration mode o see those info. Router(Config)# ??????

4 Answers   Juniper Networks,


Identify the 2 types of access-list filters that control SAP traffic? A.) Novell-ether B.) Arpa C.) Input-sap-filter D.) Round-robin E.) Output-sap-filter

1 Answers  


Which two describe frame tagging? A.) Examines particular info about each frame B.) A unique ID placed in the header of each frame as it traverses the switch fabric C.) A user- assigned ID defined to each frame D.) The building of filter tables

1 Answers  


A server is running HTTP, SMTP and DHCP. Which of the following best explains how the server is able to handle all three services over the same connection? The server has separate buffer areas for each application and forwards all data to each service. If the data does not apply to that application, it is discarded. The server processes each packet one at a time and forwards the data to the application that indicates that it is waiting for a transmission to arrive. The data is discarded if it does not apply to that application. The server uses the destination port number in the TCP/UDP header to identify the service. The data is forwarded to the service identified by the port number. The server uses separate three-way handshake connections to control the flow of the data and relates the service to the proper connection. This relationship allows the server to pass the data to the proper service.

1 Answers  


Categories