EIGRP was developed to improve what two protocols?
A. OSPF
B. RIP
C. BGP
D. IGRP
Answers were Sorted based on User's Feedback
Answer / guest
Answer: B and D
EIGRP was developed to improve IGRP, which was developed to
improve RIP.
| Is This Answer Correct ? | 83 Yes | 5 No |
Answer / guest
its an advanced version of RIP/IGRP and it has almost all
the qualities of OSPF but much more easier then OSPF
| Is This Answer Correct ? | 46 Yes | 4 No |
Answer / dillibabu
igrp and ospf
igrp:it is a distance vector protocol and it uses metirc as
a bandwith an is in 24 byte delay and it is an 24
bytelengh.it sends an routing updates for every 60 sec or
user specied in the interface. wont support vlsm,
ospf:it is an link state protcol and it sends the only
incrmental updtes ti its neighbours but it refreshes at
every 30 minutes in links and send lsa to all configured
routers with in a domain.it supports vlsm,hireachical
designing,incrmental upddes
| Is This Answer Correct ? | 13 Yes | 7 No |
What happens when the hold-down timer expires? A. Routes are flushed from the routing table after the flush timer expires B. Routes are flushed from the routing table immediately C. Routes are never flushed D. A triggered update will reset the hold-down timer
Distance Vector and Link-State protocols converge more quickly if: A. there is router redundancy B. there is router redistribution C. the update interval is set to its maximum D. the whole routing table is sent to announce changes
When should you apply SAP filters to Netware service advertisement messages? A. When services are not required for a particular area or network B. Only after service advertisement messages have flooded the network C. Before any type of router convergence takes place D. When no change in network services has taken place for 40 minutes
You may receive a case study including Token Ring and Ethernet, so you may want to look at any constraints with cabling between Token Ring and Ethernet networks. Which statement describes the constraints imposed by the existing network? A. Replace all cabling B. Test all cabling C. Do not replace cabling D. Use microwave instead of cabling
Which of the following does not specify an application requirement that affects your network design? A. The number of users B. The peak hours that the applications are used C. The types of applications used D. Security risks
What are the three commonly used methods of flow control used for handling network congestion? A. Buffering B. Source-quench messages C. Error checking D. Windowing
Traffic Shaping does which one of the following? A. Eliminates bottlenecks by throttling back traffic volume at the source or outbound end B. Reduces the frame size so bandwidth is better utilized C. It increases source traffic to a configured bit rate D. Allows you to control hubs and repeaters
It is not necessary to build an entire network to prove your network design. A. True B. False
What type of address is analyzed by a Layer 2 switch? A. network address B. MAC and network address C. Protocol type, MAC, and network address D. MAC address
When characterizing a network, how many buffer misses should not be exceeded on a Cisco router per hour? A. 10 B. 25 C. 50 D. 100
What is the first step in diagramming packet flow for the terminals within a network? A. Identify the end user nodes of all the terminals B. Figure out the speed of all the servers C. Find out where all the routers are located D. Find out where all the switched are located
OSPF supports priority routing for which TCP/IP feature? A. PA B. TCP C. IP D. SNA