WHAT IS RIP PROTOCAL ?
Answers were Sorted based on User's Feedback
Answer / khaja asad ali
The Routing Information Protocol (RIP) is a distance-vector
routing protocol, which employs the hop count as a routing
metric. RIP prevents routing loops by implementing a limit
on the number of hops allowed in a path from the source to a
destination. The maximum number of hops allowed for RIP is
15. This hop limit, however, also limits the size of
networks that RIP can support. A hop count of 16 is
considered an infinite distance and used to deprecate
inaccessible, inoperable, or otherwise undesirable routes in
the selection process.
| Is This Answer Correct ? | 7 Yes | 1 No |
Answer / mahadev
rip means routing information protocol it provides information about routing
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / guest
THIS PROTOCAL IS USED BY EIRGP FOR RELIBAL DELIVARY OF
PACKET
| Is This Answer Correct ? | 2 Yes | 15 No |
In eigrp metric parameters which 2 options are enable by default?
How would you configure one host name that points to two IP addresses? A. IP host jacob 1.0.0.5 2.0.0.8 B. IP jacob 1.0.0.5 2.0.0.8 C. IP host jacob 1.0.0.5 D. IP host duplicate "all"
What is the default CDP broadcast update rate for Cisco routers? A.) 120 seconds B.) 60 seconds C.) 30 seconds D.) 90 seconds
Identify 2 features of PPP CHAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) Less secure then PAP D.) Local router 'challenges' the remote router
What is a characteristic of Store and Forward switches? A.) They forward the frame before it is completely read. B.) They work at wire speed. C.) They are the same a Cut-Through switching. D.) They read the entire frame and check CRC before forwarding. E.) They decrease latency.
Can you explain tunneling?
What is proxy-ARP and how it is used and configured
What do the following commands accomplish? access-list 1 permit 172.16.0.0 0.0.255.255 interface ethernet 0 IP access-group 1 out interface ethernet 1 IP access-group 1 out A. Only traffic from the source network 172.16.0.0 will be blocked. B. Only traffic from the source network 172.16.0.0 will be forwarded. Non-172.16.0.0 network traffic is blocked. C. Non-172.16.0.0 traffic will be forwarded. D. All traffic will be forwarded.
Your network uses a Class C address of 210.10.10.0. You must now split up the network into separate shores to handle multiple buildings separated by routers. Which two steps must you take to determine the proper shored mask for your networks? (Choose two) A. determine the number of seperate networks required B. determine how many devices will require DHCP addressing C. determine the maximum number of hosts that will be on each shored D. determine the miniumum number of hosts that will be on each shored E. determine which router will be the IP default gateway for each shored
Tell me when we use extended access-list?
What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer
Which OSI layer supports the communication component of an application? A.) Data-Link B.) Physical C.) Session D.) Presentation E.) Application F.) Transport