Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is the routing algorithm used by RIP and IGRP?

A.) OSPF

B.) Link-state

C.) Dynamic

D.) Distance Vector

Answers were Sorted based on User's Feedback



What is the routing algorithm used by RIP and IGRP? A.) OSPF B.) Link-state C.) Dynamic ..

Answer / guest

Answer: D

Distance vector-based routing algorithms (also known as
Bellman-Ford

algorithms) pass periodic copies of a routing table from
router to

router. Regular updates between routers communicate topology
changes.

Each router receives a routing table from it's direct
neighbor and

increments all learned routes by one. By this method, each
router learns

the internetwork topology via second hand information.

Is This Answer Correct ?    36 Yes 3 No

What is the routing algorithm used by RIP and IGRP? A.) OSPF B.) Link-state C.) Dynamic ..

Answer / kapilasdhir

D.) Distance Vector

Is This Answer Correct ?    22 Yes 6 No

What is the routing algorithm used by RIP and IGRP? A.) OSPF B.) Link-state C.) Dynamic ..

Answer / nawaz

D is correct
rip and igrp use distance vector algorthim ...this algorthm
is also known as bellman - ford ....when rip recievies any
update from directly connected router it add plus one in
their existing matric.

Is This Answer Correct ?    5 Yes 3 No

What is the routing algorithm used by RIP and IGRP? A.) OSPF B.) Link-state C.) Dynamic ..

Answer / victor

The Routing Information Protocol is an interior routing
protocol used inside
an autonomous system. It is a very simple protocol
based on distance vector
routing which uses the Bellman-Ford algorithm for
calculating the routing
tables. RIP uses hop count as its only metric.

Is This Answer Correct ?    3 Yes 5 No

Post New Answer

More CCNA Interview Questions

Hi friend , This is Harekrushna . I have been tried for netsim keygen but i could not download this crack file .if it download then showes the writer protect error. PLEASE sugest me what isthe soluation. or any other software avalibe for pratics the network .

2 Answers   PCS,


How do areas benefit a link state inter network?

0 Answers  


Identify the 3 Internet layer IP protocols? A.) NetBios B.) IPX C.) ARP D.) IP E.) RARP

3 Answers  


You are given the following address: 15.16.193.6/21. Determine the subnet mask, address class, subnet address, and broadcast address. A. 255.255.248.0, A, 15.16.192.0, 15.16.199.255 B. 255.255.248.0, B, 15.16.192.0, 15.16.199.255 C. 255.255.248.0, A, 15.16.199.255, 14.15.192.0 D. 255.255.242.0, A, 15.16.192.0, 15.16.199.255

2 Answers  


You want to set the console password to ralph. What would be the first command you need to execute from global configuration mode? A.) line console 0 B.) enable password ralph C.) login password ralph D.) set password= ralph E.) password ralph F.) login Ralph

1 Answers  


Tell me which protocol comes under hybrid dynamic type?

0 Answers  


What is mac address size of ipv6?

0 Answers  


Why would you use static routing instead of dynamic routing? A.) When you want automatic updates of the routing tables B.) All the time C.) When you have very few routes and want to conserve bandwidth D.) When you have a gateway of last resort

1 Answers  


Identify the effect of Ctrl-Z? A.) Exits back to privileged exec mode B.) Disconnect from the router C.) Abort the ping operation D.) Exits privileged exec mode

3 Answers  


Differentiate full-duplex from half-duplex.

0 Answers  


friends i have some problem in the acess list plz help me out. purbi sinha. 1 what is the diffrence b/w inbound and out bound access list 2 what is main diffrence betwwen standred acesslist and extended access list 3 where should i keep stnadred access list and exatended access list i mean at which interface and why? 4 why wild card masking is used 5 what is switch febric in switching plz help me out i am litle bit confuse

1 Answers  


Which of the following is an example of the Network Layer? A.) TCP B.) IP C.) SQL D.) Token Ring E.) LLC

2 Answers  


Categories