Which of the following are solutions to the problems encountered
with Distance-Vector routing?
A.) Defining a Maximum
B.) Poison Reverse
C.) Triggered Updates
D.) Shortest path first algorithm.
E.) Split Horizon
Answer / guest
Answer: A B C E
The Shortest Path First (SPF) algorithm is used only with
Link-State
protocols such as OSPF.
| Is This Answer Correct ? | 2 Yes | 0 No |
thnx Jitender singh...as u told to install a stp in switches and problem vil b get solved...i wanna kno how to install stp in switches?? plz tel me detailled steps... thanx for ur answer.
Which statement is true? A. While bridges are used to segment networks, they will not isolate broadcast or multicast packets. B. A bridge looks at every packet within its network segment and works like a hub re-broadcasting the packet if the destination is within its network segment. C. A bridge maintains a table of the IP addresses of the hosts within its network segment and forwards the packet directly to the destination based upon the IP address. D. A bridge resets the hop count by keeping all packets within the network segment. Only packets addressed to a specific destination host outside the network segment are allowed to pass through the bridge.
What is convergence time? A.) The update time B.) The time it takes to reload a router C.) The time it takes for a packet to reach its destination D.) The time is takes for all routers update their tables after a change takes place
IPX traffic using different encapsulation types can go over the same data link A. True B. False
which is following route will be used to froword data in a situation where a routing table tables contains static ,RIP,IGRP routes destined to the same network with each set to its default administrative distance
What is STP and what is the difference between PVST and RSTP
Which command displays the IP addresses assigned to specific host names? A. show hosts B. show interface C. ping host name D. config host name E. show host mapping F. show host ip address G. trace ip addresses host name H. a partridge in a pear tree
You create the following standard access-list access-list 1 deny 1.1.1.1 access-list 1 deny 2.2.2.2 int e0 ip access-group 1 in Which of the following statements are true, with regard to traffic flowing into E0? A.) This will stop IP packets with a source address of 1.1.1.1 only. B.) This will stop all IP packets. C.) This is an invalid configuration. D.) This will stop no IP packets. E.) This will stop IP packets with a source address of 2.2.2.2 only. F.) This will stop IP packets with a source address of 1.1.1.1 and 2.2.2.2.
Tell me which protocol called rapid protocol?
Identify the access-list range for an extended IP access-list? A.) 800 - 899 B.) 1 - 99 C.) 1000 - 1099 D.) 100 - 199
Which OSI layer performs code conversion, code formatting and encryption? A.) Physical B.) Data-Link C.) Application D.) Transport E.) Presentation F.) Network
What is the IP extended access list range? A.) 1000-1099 B.) 100-199 C.) 1-99 D.) 101-200