Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Which of the following are Distance Vector protocols?

A.) IGRP

B.) RIP

C.) OSFP

D.) EIGRP

Answers were Sorted based on User's Feedback



Which of the following are Distance Vector protocols? A.) IGRP B.) RIP C.) OSFP D.) EIGR..

Answer / guest

Answer: A B

Is This Answer Correct ?    5 Yes 1 No

Which of the following are Distance Vector protocols? A.) IGRP B.) RIP C.) OSFP D.) EIGR..

Answer / kingsly

IGRP and RIP are Distance vector protocol.OSPF is link-
state routing protocol,EIGRP is DUAL alogaritham .

Is This Answer Correct ?    3 Yes 0 No

Which of the following are Distance Vector protocols? A.) IGRP B.) RIP C.) OSFP D.) EIGR..

Answer / yogesh bhardwaj

B.) RIP

Is This Answer Correct ?    1 Yes 2 No

Post New Answer

More CCNA Interview Questions

router

4 Answers   Infotech,


What are the two types of transmission technology available in ccna?

1 Answers  


Which global configuration command will tell the router to load the IOS file 'IOS_filename' from FLASH memory at the next boot? A.) boot system flash B.) boot system flash IOS_filename C.) boot system IOS_filename flash D.) boot system tftp IOS_filename tftp_address E.) config-register 0x0102 IOS_ filename

2 Answers   HSBC,


Identify the 3 major functions at layer 3 of the OSI model? A.) Forwarding process B.) Logical addressing C.) End-to-end connections D.) Path selection E.) MAC address examination F.) Network monitoring

2 Answers  


Identify the access-list range for an extended IP access-list? A.) 800 - 899 B.) 1 - 99 C.) 1000 - 1099 D.) 100 - 199

1 Answers  


How ICMP is used in ping and traceroute facilities

3 Answers  


if 10 pc's connected from internet, in 8 pc's internet is correctly run but in other 2 pc's they can not access internet,what's the problem?

9 Answers   Fibcom, TATA,


How loops are introduced in switching? Whats the solution for that.

2 Answers   HCL,


How many potions of ip?

0 Answers  


An optional parameter on an IPX access is the 'LOG' parameter. This records access-list violations when a packet matches. What else does the 'LOG' option do? A.) Records the number of times that a packet matches the list. B.) Return a message to user who is denied access the by list. C.) Notifies an SNMP Agent. D.) Saves the log to NVRAM. E.) Send an SNMP Trap.

1 Answers  


What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet

3 Answers  


Extended IP access-lists (100-199) can be used to control traffic. Which command listed below will permit smtp mail to only host 3.4.5.6 ? A.) It is not possible for SMTP traffic B.) access-list 102 permit tcp any host 3.4.5.6 eq smtp C.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 23 D.) access-list 102 permit tcp any any eq smtp E.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 25

1 Answers  


Categories