How many networks will be advertised using route
summarization within an OSPF network if you are given the
following networks?
192.108.168.0
192.108.169.0
192.108.170.0
192.108.171.0
192.108.172.0
192.108.173.0
192.108.174.0
192.108.175.0
A. 1
B. 2
C. 3
D. 4
E. 5
Answer / guest
Answer: A
Using route summarization, these eight networks can be
summarized into one larger network and then advertised. You
could have these routes advertised individually as
192.108.168.0/24, 192.108.169.0/24, etc. or summarize then
all as 192.108.168.0/21. This is one-eighth the size of the
original route table. This can save a lot of memory and
processing power, especially when you?re talking about
hundreds or thousands of routes. The three factors that
confirm when it?s beneficial to use route summarization are:
1. The IP networks must be contiguous (for example,
199.42.168.0, 199.42.169.0, 199.42.170.0, etc.). Networks
that aren?t contiguous cannot be summarized safely into a
single statement.
2. The routing tables must support classless routing.
3. The routing protocols must support both prefix length and
subnet information along with the IP address.
Is This Answer Correct ? | 2 Yes | 1 No |
How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data
How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redundant paths within the network B. By calculating the metrics of each path C. By detecting and logically blocking redundant paths from the network D. By creating virtual LANS
Which Of the Statements best describes VPLS ?
Match the following routing protocols with their routing algorithm. A. OSPF 1. Distance Vector B. IGRP 2. Link-State C. RIP D. IS-IS E. NLSP F. RTMP G. AURP H. BGP
What protocol advertises Netware services to network clients? (Type acronym).
What are the five areas of the ISO Network Management Model? A. Performance management B. Accounting management C. Flow management D. Configuration management E. Operating management F. Fault management G. Routing management H. Security management
What is the first step in diagramming packet flow for the terminals within a network? A. Identify the end user nodes of all the terminals B. Figure out the speed of all the servers C. Find out where all the routers are located D. Find out where all the switched are located
EIGRP was developed to improve what two protocols? A. OSPF B. RIP C. BGP D. IGRP
What are three LAPB features supported by SDLC? A. Frame types B. Frame format C. Field functions D. ABM
What is not a function of the distribution layer? A. Routing between VLANs B. Implement tools such as access lists, packet filtering, and queuing C. Implement security and network policies D. Provide workgroup/user access to the network
What PPP frame initiates the network layer protocols to be used during a connection?
You may receive a case study including Token Ring and Ethernet, so you may want to look at any constraints with cabling between Token Ring and Ethernet networks. Which statement describes the constraints imposed by the existing network? A. Replace all cabling B. Test all cabling C. Do not replace cabling D. Use microwave instead of cabling