In Novell's use of RIP, there are two metrics used to make
routing decisions. Select the two metrics.
A. Ticks.
B. Hops
C. Loops
D. Counts
Answers were Sorted based on User's Feedback
Answer / guest
Answer::A &B
It first uses ticks (which is about 1/18 sec.);
if there is a tie, it uses hops; if hops are equal, then it
uses an administratively assigned tiebreaker.
| Is This Answer Correct ? | 6 Yes | 2 No |
Identify the command to display the status of the Frame Relay virtual circuit? A.) Router# show frame-relay virtual-circuit B.) Router(config)# show frame-relay pvc C.) Router# show frame-relay pvc D.) Router# show virtual
Identify 2 HDLC characteristics? A.) Default serial encapsulation B.) Open standard C.) Supports Stacker compression D.) Supports point-to-point and multipoint
what is different between cisco router and layer 3 switch
A network is vow congested currently all the devices are connected through a hub. Which would best decrease congestion on this network? A. add a second hub B. replace the hub with a router C. replace the hub with a switch D. replace the hub with a repeater
What is proxy-ARP and how it is used and configured
Which addresses are INCORRECTLY paired with their class? A. 1 to 126, Class A B. 128 to 191, Class A C. 1 to 126, Class B D. 128 to 191, Class B
What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer
Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed
7. What is an advantage to using switches in your network? A. Addressing of hosts by DHCP B. Ease of administration C. Stops broadcast storms D. Works like a repeater
Which two statements are true? (Choose two) A. Ethernet 802.3 utilizes a half duplex method for data transfer B. In a 100 MBS point to point connection a full duplex connection can provide 400 Mbs of data transfer C. Ethernet switches can use the full duplex mode to connect multiple nodes on a single pod of a switch D. Full duplex Ethernet takes advantage of UTP using one pair for transmission and the other pair for reception
Which address or number is used to pass the data to the correct application? MAC Number IP address Port Number Segment Number
The following selections show the command prompt and the configuration of the IP network mask. Which two are correct? A. Router#term IP netmask-format { bitcount | decimal | hexadecimal } B. Router(config-if)#IP netmask-format { bitcount | decimal | hexadecimal } C. Router(config-if)#netmask-format { bitcount | decimal | hexadecimal } D. Router#ip netmask-format { bitcount | decimal | hexadecimal }