Tell us the name of best path in eigrp protocol?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

What is ping? What is the usage of ping?

0 Answers  


Which command can verify only Network layer connectivity between 2 hosts? A.) ping B.) e-mail C.) plp D.) arp E.) telnet

4 Answers  


What is the function of the Transport layer and which protocols reside there? A.) MAC addressing - IP B.) Interhost communication - SQL, NFS C.) Best effort Packet delivery - TCP, UDP D.) End-to-end connections - TCP, UDP

1 Answers  


What’s the default CDP holdtime in seconds for Cisco routers?

2 Answers  


Identify 3 Fast Ethernet technologies? A.) 100 Base FastEther B.) 100 Base FX C.) 100 Base T4 D.) 100 Base TX

2 Answers  






Identify 3 UDP characteristics? A.) Reliable communication protocol B.) Applications that use UDP must incorporate reliability C.) Connection-less oriented D.) Incorporates no handshaking

2 Answers  


Which of the following are examples of the Datalink Layer? A.) LLC B.) SQL C.) TCP D.) Token Ring E.) IP

2 Answers  


Explain the term 'unicast'.

0 Answers  


What is subnetting? Why is it used?

0 Answers  


Which of the following are examples of the Application Layer? A.) LLC B.) Token Ring C.) Spreadsheet D.) TCP E.) IP F.) Word Processor

1 Answers  


hi jitendra i am sunil here and i am an engineering student from delhi i have lots of interest in computer network.i was in serch of doing communication through MAC adressess.can u help me?

1 Answers  


Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity

1 Answers  


Categories