what is meant by wild card mask and why can't we use in eigrp
?

Answers were Sorted based on User's Feedback



what is meant by wild card mask and why can't we use in eigrp ? ..

Answer / biswajit biswas, kolkata

Wild card masks are nothing but inverted subnetmasks. A wild
card mask is necessary for configuring OSPF networks because
OSPF supports both VLSM & CIDR unlike RIP & IGRP.

Although EIGRP supports VLSM, it is a hybrid protocol
because of its inherent distance vector protocol properties
- EIGRP configured with network number followed by subnet
mask like RIP & IGRP.

Is This Answer Correct ?    16 Yes 6 No

what is meant by wild card mask and why can't we use in eigrp ? ..

Answer / vinay

hi dudes.......

i have one dought regarding wildcard mask usage in eigrp......

why cant we use wildcard mask in eigrp........where i think
we can use wild card mask in eigrp.

and wildcard mask is most effective then subnetmask...

even i use wild card when i use eigrp routing at some
circumstances...

instead if you want to know do this

router eigrp 10
net 192.168.10.0 ?

here you can see that

Is This Answer Correct ?    4 Yes 0 No

Post New Answer

More CCNA Interview Questions

Explain the difference between flsm and vlsm?

0 Answers  


What does protocol mean?

0 Answers  


Explain what is the default behavior of access-list?

0 Answers  


Identify the 3 characteristics of IPX RIP? A.) Distance vector B.) Does not support multiple paths C.) 60 second updates D.) Default encapsulation is SAP E.) Uses ticks and hop count as a metric

2 Answers  


which of the following address represent unicast address A 224.1.5.2 B ffff.ffff.ffff.ffff C 192.168.24.59/30 D 255.255.255.255 E 172.138.128.255 plz tell what should be answer plz tell with explanation

5 Answers   IPsoft, jetking,






what are the 3ree way for implementing vlan on cisco switches what is the layer hierarchy of the cisco what is the best place of implementing standard access list what is q stand for isdn these are the challanging question for me i am waiting for jitendera sinha answer(it is challenge for u i have seen lots of answer given by u )it is a challenge in the frendshipmode plz donot take other wise

2 Answers  


Identify the 2 commands that save the running-config to a TFTP server? A.) write running tftp B.) copy running network C.) copy running tftp D.) write network

1 Answers  


Which of the following describe SMTP? A.) Used for downloading files to the router. B.) Used for sending e-mail. C.) Uses TCP. D.) Uses UDP. E.) Uses port 25. F.) Used for managing IP devices.

1 Answers  


Choose three reasons why the networking industry uses a layered model: A.) It facilitates systematic troubleshooting B.) It allows changes in one layer to occur without changing other layers C.) It allows changes to occur in all layers when changing one protocol D.) It clarifies how to do it rather than what general function to be done E.) It clarifies what general function is to be done rather than how to do it

1 Answers  


Which LAN switching method is used in CISCO Catalyst 5000?

0 Answers  


Identify the command that forces the router to load into ROM mode upon a reload? A.) boot system rom B.) rom boot C.) boot system flash rom D.) boot router rom

1 Answers  


In port based access-list which command u give instead of ip?

0 Answers  


Categories