Distance Vector and Link-State protocols converge more
quickly if:
A. there is router redundancy
B. there is router redistribution
C. the update interval is set to its maximum
D. the whole routing table is sent to announce changes
Answer / guest
Answer: A
Distance Vector and Link-State protocols converge more
quickly if there is redundancy between routers.
Redistribution is when you can exchange routing information
between networks that are using different routing protocols.
Route redistribution is a key feature in Cisco routers.
Mastering the usage of route redistribution is important to
enable different protocols to communicate with each other
successfully. Setting the update interval to the maximum
means that it would take longer for changes to propagate
through the network. Sending the whole routing table is not
as efficient as sending only the part that has changed.
Convergence is the process of agreement, by all routers, on
optimal routes. When a network event causes routes to either
halt operation or become available, routers distribute
routing update messages. Routing update messages permeate
networks, stimulating recalculation of optimal routes and
eventually causing all routers to agree on these routes.
Routing algorithms that converge slowly can cause routing
loops or network outages.
| Is This Answer Correct ? | 1 Yes | 0 No |
When doing an RFP (Request for Purchase) for a customer, at what step do you reiterate your solution and the customer requirements? A. Design Requirements B. Design Solution C. Summary D. Appendices
Which two LAN switching features apply to store-and-forward switches? A. CRC B. Frame length C. Source address D. Collision Windows
What protocol advertises Netware services to network clients? (Type acronym).
Traffic Shaping does which one of the following? A. Eliminates bottlenecks by throttling back traffic volume at the source or outbound end B. Reduces the frame size so bandwidth is better utilized C. It increases source traffic to a configured bit rate D. Allows you to control hubs and repeaters
Which router would you choose for your design? A. 1600 B. 1700 C. 3600 D. 3640 E. 7200
How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redundant paths within the network B. By calculating the metrics of each path C. By detecting and logically blocking redundant paths from the network D. By creating virtual LANS
What should be looked at first to determine if a customer should switch from a hub environment to a switched environment? A. Investigate the number of broadcasts B. Investigate the number of collisions C. Determine what routing loops are present D. Determine which switching type is being used by the hubs
Which of the following three protocols replace SDLC? A. 802.2 B. HDLC C. QLLC D. X.25
A remote user needs a static IP address to support a specific application.Which remote access VPN addressing technique supports this ?
What is the second step when creating a prototype? A. Develop a test plan B. Review the customer requirements C. Investigate what the competition will be proposing D. Define how big the prototype will be
When are SNMP traps sent? A. When the SNMP manager wants to perform remote configuration on a networking device B. When an SNMP agent wants to inform the SNMP manager about a change of state on the networking device C. When the SNMP manager wants to access large chunks of data D. When the NMS wants to share trap information
How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data