Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Identify 3 methods not used to prevent routing loops?

A.) Holddown timers

B.) Sequence numbers

C.) Triggered updates

D.) Split horizon

E.) Area hierarchies

F.) Order of router startup

Answers were Sorted based on User's Feedback



Identify 3 methods not used to prevent routing loops? A.) Holddown timers B.) Sequence numbers..

Answer / guest

Answer: B E F

Is This Answer Correct ?    9 Yes 2 No

Identify 3 methods not used to prevent routing loops? A.) Holddown timers B.) Sequence numbers..

Answer / gt

A & D

Is This Answer Correct ?    1 Yes 0 No

Identify 3 methods not used to prevent routing loops? A.) Holddown timers B.) Sequence numbers..

Answer / muheed

A.) Holddown timers-No updates are entertained

C.) Triggered updates-triggering that there is route posining

D.) Split horizon-no return updates that I have updated

Is This Answer Correct ?    2 Yes 5 No

Post New Answer

More CCNA Interview Questions

Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed

1 Answers  


You need to come up with a TCP/IP addressing scheme for your company. Which two factors must you consider when you define the subnet mask for the network? A.) The location of DHCP servers B.) The volume of traffic on each subnet C.) The number of subnets on the network D.) The location of the default gateway E.) The number of host IDs on each subnet

2 Answers  


What are the different types of cables that are used in routing?

0 Answers  


Can you explain IKE phases? Can you explain IKE modes?

1 Answers   CCIE,


what is different between semi-managed and managed Switch ?

2 Answers  


Which LAN switching method is used in CISCO Catalyst 5000?

0 Answers  


what is Bandwidth capping

0 Answers   Infosys,


What is the diiffernce between windows xp & windows 2000?

6 Answers   TCS, Trimax, Trymax, VigaTech,


What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS

1 Answers  


Name the 2 protocols are in wan technology?

0 Answers  


The "ipx delay number" command will allow an administrator to change the default settings. What are the default settings? A. For LAN interfaces, one tick; for WAN interfaces, six ticks B. For LAN interfaces, six ticks; for WAN interfaces, one tick C. For LAN interfaces, zero ticks; for WAN interfaces, five ticks D. For LAN interfaces, five ticks; for WAN interfaces, zero Ticks

1 Answers  


Regarding frame relay, which of the following statements are true? A.) You must use ANSI encapsulation if connecting to non-Cisco equipment B.) You must use IETF encapsulation if connecing to non-Cisco equipment C.) You must use Q.933a encapsulation if connecing to non-Cisco equipment D.) You must use Cisco encapsulation if connecting to non-Cisco equipment

1 Answers  


Categories