Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Identify 3 methods not used to prevent routing loops?

A.) Holddown timers

B.) Sequence numbers

C.) Triggered updates

D.) Split horizon

E.) Area hierarchies

F.) Order of router startup

Answers were Sorted based on User's Feedback



Identify 3 methods not used to prevent routing loops? A.) Holddown timers B.) Sequence numbers..

Answer / tushar

B, E, F

Is This Answer Correct ?    0 Yes 0 No

Identify 3 methods not used to prevent routing loops? A.) Holddown timers B.) Sequence numbers..

Answer / guest

Answer: B E F

Area hierarchies, sequence numbers and order of router
startup all

relate to Link State routing protocols which do NOT incur
routing loops.

Is This Answer Correct ?    1 Yes 4 No

Post New Answer

More CCNA Interview Questions

What type of frame does CDP use to gather information about it's neighbors? A.) TCP/IP B.) Novell-ether C.) Subnetwork Access Protocol (SNAP) D.) Ethernet_II

1 Answers  


What is the Difference between Hub and Switch?

2 Answers  


the term which used for describe physical alyout of network mine answer-topology

1 Answers  


Which protocol supenetting is enable by default?

0 Answers  


On which base distance vector choose best path?

0 Answers  


Identify the default values that make up IGRP's composite metric? A.) Bandwidth B.) Load C.) Reliability D.) MTU E.) Delay

1 Answers  


What do the following commands accomplish? access-list 1 deny 172.16.4.0 0.0.0.255 access-list 1 permit any interface ethernet 0 IP access-group 1 out A. This will block traffic from subnet 172.16.4.0 and allow all other traffic. B. This will allow traffic from subnet 172.16.4.0 and block all other traffic. C. All traffic is allowed. D. All traffic is blocked.

1 Answers  


You need to come up with a TCP/IP addressing scheme for your company. Which two factors must you consider when you define the subnet mask for the network? A.) The location of DHCP servers B.) The volume of traffic on each subnet C.) The number of subnets on the network D.) The location of the default gateway E.) The number of host IDs on each subnet

2 Answers  


Can anyone explain in details the STP port state?????

2 Answers  


Which memory component on a Cisco router contains the dynamic system configuration? ROM NVRAM Flash RAM/DRAM

17 Answers   HCL, Sun TV,


Which two statements are true? (Choose two) A. Ethernet 802.3 utilizes a half duplex method for data transfer B. In a 100 MBS point to point connection a full duplex connection can provide 400 Mbs of data transfer C. Ethernet switches can use the full duplex mode to connect multiple nodes on a single pod of a switch D. Full duplex Ethernet takes advantage of UTP using one pair for transmission and the other pair for reception

1 Answers  


Which two statements accurately define IP addressing rules? (Choose two) A. IP multicast addresses start with 240 B. A host Carbon of all 1 a indicates a network broadcast C. The value of zero (0) in the host Carbon means all hosts on the network D. IP addresses are four octets long and contain a network Carbon and a host Carbon

2 Answers  


Categories