Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Identify 3 IP routing protocols?

A.) RIP

B.) AURP

C.) OSPF

D.) IGRP

E.) ARP

F.) ICMP

Answers were Sorted based on User's Feedback



Identify 3 IP routing protocols? A.) RIP B.) AURP C.) OSPF D.) IGRP E.) ARP F.) IC..

Answer / guest

Answer: A C D

AURP and ICMP are not routing protocols.

Is This Answer Correct ?    7 Yes 1 No

Identify 3 IP routing protocols? A.) RIP B.) AURP C.) OSPF D.) IGRP E.) ARP F.) IC..

Answer / aashish bandawala

icmp and arp are not ip routing protocols bt these are
internet protocols only... remaining all the protocols are
ip routing protocols...

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Why we choose the router rather then L-3 Switch

8 Answers   Network Solutions, Wipro,


Identify the switching method that examines the destination MAC address as the frame is being received then begins forwarding the frame prior to receiving the entire frame? A.) Fragment-free B.) Store and Forward C.) Cut-through D.) Fast forward

2 Answers  


Which command, that is used to test address configuration, uses Time-To-Live (TTL) values to generate messages from each router. A) telnet B) ping C) trace D) bootp

4 Answers  


Identify 3 feature of access-lists? A.) Implicit deny will deny any packets not matched B.) Processed sequentially from bottom to top C.) Processed sequentially from top to bottom D.) If a packet is denied it would be tested against the remaining statements in the access-list E.) Once a match is made the packet is either denied or permitted F.) Enabled on all interfaces by default

1 Answers  


Which of the following are examples of the Datalink Layer? A.) LLC B.) SQL C.) TCP D.) Token Ring E.) IP

2 Answers  


Identify the prompt displayed if in privileged exec mode? A.) Router(config)# B.) Router# C.) Router> D.) Router(priv)#

2 Answers  


What is the Function of Router?

5 Answers  


What is Summarization and supernetting and what its use?

4 Answers  


which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?

0 Answers  


What is the default behavior of access-list?

0 Answers  


What is loop back ip in ipv6?

0 Answers  


Can you explain PPP packet format?

0 Answers   CCIE,


Categories