How does RIP differ from IGRP?
No Answer is Posted For this Question
Be the First to Post Answer
Identify 3 methods used to prevent routing loops? A.) Split horizon B.) Holddown timers C.) Poison reverse D.) SPF algorithm E.) LSP's
Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2
After how long ospf exchange its topology table?
Using the TCP/IP protocol suite a message is sent from host A to a destination IP address on the same LAN. How does host A determine the destination of MAC address? A. It uses a proxy APP B. It uses APP requests C. It uses RARP requests D. It uses a router lookup table
Which addresses are INCORRECTLY paired with their class? A. 1 to 126, Class A B. 128 to 191, Class A C. 1 to 126, Class B D. 128 to 191, Class B
friends i have 3ree prob which is asked in ibm india in technical round 1 what is ftp(this was easy i had answered) 2 why we use ftp(i think it is a tough one) 3 how can we enable ftp in the widows xp. friend i need these question answer as soon as possible if it is possible to reply within the eveing then i always obeyliged to you i am espacily looking towards the jitendera sinha who make most of the valuable answer loking toward you nidhi mall
What does the show protocol display?
Value in which type of access list?
Identify the command to display the IP host table? A.) show ip hostnames B.) show ip names C.) show hosts D.) show ip hosts
What purpose does aging serve in a link state protocol?
Identify the default values that make up IGRP's composite metric? A.) Bandwidth B.) Load C.) Reliability D.) MTU E.) Delay
What is the result of using a hierarchical addressing framework? A. increased availability of addresses B. decreased distance between routers C. increased router memory requirements D. no need to maintain routing information