What is the link state routing protocol in the TCP/IP
protocol stack?
A. IP
B. IS-IS
C. NLSP
D. OSPF
E. RIP version 2
Answers were Sorted based on User's Feedback
Identify the 3 kinds of routes IGRP advertises? A.) Interior B.) Dynamic C.) System D.) Exterior
Identify the IPX standard access-list number range? A.) 600 - 699 B.) 1000 - 1099 C.) 1 - 99 D.) 100 - 199 E.) 800 - 899
What is a protocol
Hey Folks how are you i guess some of guys are newly visitors of this site so let me introduce my self. I am jitendera kumar sinha working for cisco system (india)( Network engineer L2) and i was also a regular Visitors of this site and i have provided lots of answer and i do not know how many are correct :-) By the way i am here again to learn some thing and share my knowledge which is beyond CCNA Scope and and it is some where related to ccnp ( switching )and ccnp Security as i am pursuing ccnp security so i am going to start the topics from switching and will share my knowledge and try to brush-up my knowledge.... so let me know any topic in switching where you are facing difficulty and i will try to solve it so please post one topic and i will reply weekly as i am getting time on Sunday only
Given an IPX network with redundant paths, what command will configure load balancing? A.) ipx load-balance B.) ip maximum-paths 2 C.) ipx maximum-paths 2 D.) ipx load-share
Which of the following is an example of the Physical Layer? A.) SQL B.) IP C.) LLC D.) DDP E.) Ethernet
What are the disadvantages of symmetric algorithms?
HOW MPLS IS DIFFERENT FROM OSPF? WHY NOW A DAYS MPLS IS PREFERED OVER ANY NETWORK PROTOCOL?
What is the routing metric used by IGRP? A.) MTU, delay, bandwidth, reliability, and loading B.) Count to infinity C.) TTL D.) Hop count
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
Explain how an spf algorithm works?
Do we subletting of ip?