Identify the 2 rules used when configuring a Distance Vector

routing protocol?

A.) Physically connected network(s)

B.) Configure the classful address, no subnets

C.) Enable CDP so neighbors can be detected

D.) Configure all networks in Area0



Identify the 2 rules used when configuring a Distance Vector routing protocol? A.) Physically ..

Answer / guest

Answer: A B

When configuring a Distance Vector routing protocol only
assign the

physically connected networks with the classful address only.

Is This Answer Correct ?    1 Yes 1 No

Post New Answer

More CCNA Interview Questions

Explain the difference between collision domain and broadcast domain.

0 Answers  


When using TCP, after a session is open, the applications can adjust the amount of segments they receive before sending an acknowledgment. This behaviour is known as ______________. FCS Windowing MTU adjustment Flexible Send Path

1 Answers  


Which command loads a new version of the Cisco IOS into a router? A. copy flash ftp B. copy ftp flash C. copy flash ftp D. copy tftp flash

2 Answers  


Which of the following are valid Cisco encapsulation type names? A.) arpa = IPX Ethernet B.) novell-ether = IPX Ethernet_802.3 C.) snap = IEEE 802.2 SNAP on Ethernet, FDDI, and Token Ring D.) novell-fddi = IPX Fddi_Raw E.) sap = IEEE 802.2 on Ethernet, FDDI, and Token Ring F.) hdlc = HDLC on serial interfaces

1 Answers  


On Cisco catalyst 5000 how would you set the second port on the controller in the first slot to full duplex? A.) Set port duplex 1/1 full B.) Set port duplex 1/2 full C.) Set port duplex 0/1 full D.) Set port duplex 0/2 full

2 Answers  






Identify the definition of demarcation? A.) Date in which the WAN service contract expires B.) Cabling which extends from the WAN service provider to the customer C.) Division of responsibility, where the CPE ends and the local loop begins D.) Equipment which is located at the customer premises

2 Answers  


Two of the protocols that can be carried in the Protocol field of an IP packet are? A. TCP B. UDP C. FTP D. TFTP

2 Answers  


What is difference between routing and routed protocols?

0 Answers  


Extended IP access-lists (100-199) can be used to control traffic. Which command listed below will permit smtp mail to only host 3.4.5.6 ? A.) It is not possible for SMTP traffic B.) access-list 102 permit tcp any host 3.4.5.6 eq smtp C.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 23 D.) access-list 102 permit tcp any any eq smtp E.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 25

1 Answers  


Identify 3 LAN technologies? A.) FDDI B.) HDLC C.) HSSI D.) X.25 E.) 802.3 F.) 802.5

1 Answers  


Which OSI Reference Layer is concerned with path determination? A.) Datalink B.) Physical C.) Network D.) Transport E.) Session

2 Answers  


Which of the following are valid WAN terms? A.) DTE B.) DCE C.) Demarc D.) CPE

3 Answers   IBM,


Categories