What is trigger rip and from which ios version it starts?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

Which mode called privilege mode?

0 Answers  


In IOS boot sequence if the flash is erased, and there is no access to TFTP server, and we can't load the partial IOS from ROM. Is there any possiblity that we can still boot the router/switch from external PC in which the IOS is installed?

6 Answers  


Write out a config to permit only the below MAC address to pass traffic through a port on your switch. mac-address 0005.1b00.5b58

4 Answers  


why we give clock rate to DCE and not to DTE what is the difference in the two.

3 Answers  


What are the types of resource sharing?

0 Answers  






What is public and private ip address., explain? and also explain the ip address range of both public and private? and where we use that public and private ip address?

13 Answers  


What is the Network Layer of the OSI responsible for? A.) Bridging B.) Routing packets through an internetwork C.) Regenerating the digital signal D.) Gateway services

3 Answers  


. Which command sequence will allow only traffic from network 185.64.0.0 to enter interface s0? A. access-list 25 permit 185.64.0.0 255.255.0.0 int s0 ; ip access-list 25 out B. access-list 25 permit 185.64.0.0 255.255.0.0 int s0 ; ip access-group 25 out C. access-list 25 permit 185.64.0.0 0.0.255.255 int s0 ; ip access-list 25 in D. access-list 25 permit 185.64.0.0 0.0.255.255 int s0 ; ip access-group 25 in

1 Answers  


Which technology is used by Catalyst switches to resolve topology loops and ensure data flows properly through a single network path? A. virtual LANS (VLANS) B. frame filtering C. cut-through switching D. spanning-tree protocol

2 Answers  


Identify the 2 characteristics regarding MAC addresses? A.) Contains a network portion and host portion B.) Always assigned by System Administrator C.) 48 bits long D.) Contains a vendor code and serial number

2 Answers  


Given the configuration example<HR> <B>interface ethernet0 ipx network 4a ipx access group 800 out interface ethernet1 ipx network 3d interface ethernet2 ipx network 5c access list 800 permit 3d 4a</B><HR> Which two actions result from implementing this configuration? (Choose two) A. IPX network 5c will not receive any traffic B. Traffic from network 3d for network 4a will be forwarded out e0 C. Traffic from network 4a for network 3d will be forwarded out e0 D. Traffic from network 3d destined for network 4a will be forwarded out e2 E. The access list is applied to an outgoing interface and filters outbound traffic

1 Answers  


How does L2TP process?

0 Answers   CCIE,


Categories