When a Distance Vector routing protocol detects that a connected
network has gone down, it sends out a special routing update
packet,
telling all directly connected routers that the distance to
the dead
network is infinity. This is an example of which routing
technology?
A.) ICMP.
B.) Only Link State routing protocols have this intelligence.
C.) Triggered updates.
D.) Garrison-4.
E.) Split Horizon.
F.) Poison Reverse.
Answer / guest
Answer: F
Instead of just removing the route from the routing update,
Poison
Reverse sets the distance to 'infinity' (for IP RIP this is
a hop count
of 16). This immediately makes the route invalid for all
neighboring
routers.
| Is This Answer Correct ? | 1 Yes | 0 No |
Identify 3 characteristics of a connection oriented protocol? A.) Path determination B.) Flow control C.) Acknowledgements D.) Uses hop count as metric E.) 3 step handshake
What is the function of application layer in networking?
HI ALL , wanted to know if the rstp protocol.. rapid spanning tree protocol .. is imp to study with ccna's point of view or study of STP will be enough.. in some books rstp is nt given like todd lamle however in icnd2 its explained in detail.. please suggest asap .. thanks ..
What's the default CDP holdtime in seconds for Cisco routers? A.) 30 seconds B.) 180 seconds C.) 90 seconds D.) 60 seconds
Identify the command to determine if CDP is enabled? A.) show enable cdp B.) show cdp enabled C.) show cdp run D.) show cdp
Can you explain the difference between trusted and untrusted networks?
The Datalink layer works with which of the following: A.) Packets B.) Bits C.) Globules D.) Frames E.) Segments
. Which command sequence will allow only traffic from network 185.64.0.0 to enter interface s0? A. access-list 25 permit 185.64.0.0 255.255.0.0 int s0 ; ip access-list 25 out B. access-list 25 permit 185.64.0.0 255.255.0.0 int s0 ; ip access-group 25 out C. access-list 25 permit 185.64.0.0 0.0.255.255 int s0 ; ip access-list 25 in D. access-list 25 permit 185.64.0.0 0.0.255.255 int s0 ; ip access-group 25 in
What is Spanning Tree Protocol and how it work? I know it is - STP is Spanning tree Protocol. It Stops the looping in the network? How STP work? How it stop Looping in network?
Which three are typical operational phases in a basic connection oriented network service? A. call setup B. data transfer C. load balancing D. call termination E. caller ID F. call prionflication G. data segmentation H. data and momma I. data link identification J. callering book
What is the purpose of Split Horizon? A.) It prevents the regular update messages from reinstating a route that has gone down B.) Information received on an interface cannot be sent back out the same interface C.) Informs all neighbor routers that two routes exist D.) Tells the router the destination is unreachable
Which statement about the flow control function of TCP is true? A. TCP makes no snarl to check for lost or duplicate data packets B. The application layer must sequence data packets when using TCP C. TCP controls the flow of UDP data through negative acknowledgements (NAK) D. TCP is a connection oriented protocol that acknowledges receipt of data packets and is considered reliable