Which of the following are Distance Vector protocols?
A.) IGRP
B.) RIP
C.) OSFP
D.) EIGRP
Answers were Sorted based on User's Feedback
Answer / kingsly
IGRP and RIP are Distance vector protocol.OSPF is link-
state routing protocol,EIGRP is DUAL alogaritham .
| Is This Answer Correct ? | 3 Yes | 0 No |
router
What are the two types of transmission technology available in ccna?
Which global configuration command will tell the router to load the IOS file 'IOS_filename' from FLASH memory at the next boot? A.) boot system flash B.) boot system flash IOS_filename C.) boot system IOS_filename flash D.) boot system tftp IOS_filename tftp_address E.) config-register 0x0102 IOS_ filename
Identify the 3 major functions at layer 3 of the OSI model? A.) Forwarding process B.) Logical addressing C.) End-to-end connections D.) Path selection E.) MAC address examination F.) Network monitoring
Identify the access-list range for an extended IP access-list? A.) 800 - 899 B.) 1 - 99 C.) 1000 - 1099 D.) 100 - 199
How ICMP is used in ping and traceroute facilities
if 10 pc's connected from internet, in 8 pc's internet is correctly run but in other 2 pc's they can not access internet,what's the problem?
How loops are introduced in switching? Whats the solution for that.
How many potions of ip?
An optional parameter on an IPX access is the 'LOG' parameter. This records access-list violations when a packet matches. What else does the 'LOG' option do? A.) Records the number of times that a packet matches the list. B.) Return a message to user who is denied access the by list. C.) Notifies an SNMP Agent. D.) Saves the log to NVRAM. E.) Send an SNMP Trap.
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
Extended IP access-lists (100-199) can be used to control traffic. Which command listed below will permit smtp mail to only host 3.4.5.6 ? A.) It is not possible for SMTP traffic B.) access-list 102 permit tcp any host 3.4.5.6 eq smtp C.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 23 D.) access-list 102 permit tcp any any eq smtp E.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 25