A.Link-local address used for next-hop addresses
B.Interface can be added to RIP routing process in either interface configuration mode or in routerconfiguration mode
C.Uses a multicast to send routing updates
D.Use hop count as a metric
E.Distance-vector routing protocol
F.Maximum hop count is 15 with 16 being "unreachable"
您可能感興趣的試卷
你可能感興趣的試題
A.The default-metric command configured under the appropriate interface
B.The metric parameter in the network command of a routing process
C.The metric parameter in the redistribute command
D.The default-metric command
E.A route-map containing a seed command
F.A route map containing a metric command
A.Designated port
B.Nonswitch port
C.Switch port
D.Nonroot port
E.Nondesignated port
F.Root port
A.show ip eigrp topology
B.show ip eigrp adjacency
C.show ip eigrp routes
D.show ip eigrp database
E.show ip route eigrp
F.show ip eigrp forwarding
A.255.255.255.255
B.224.0.0.6
C.FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFF:FFF
D.FF02::10
E.224.0.0.10
F.FF02::5
A.Rl(config-if)#ipv6 default-information originate
B.Rl(config-router)#ipv6 rip 〈process-name〉 default-information only
C.Rl(config)#ipv6 route ::/0 null 0
D.Rl(config-if)#ipv6 rip 〈process-name〉 default-information only
E.Rl(config-router)#ipv6 rip route ;:/0 originate
F.Rl(config-router)#aggregate-address ::/0 summarize-routes
最新試題
As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()
Which three statements accurately describe IOS Firewall configurations?()
A new router was configured with the following commands:The configuration above was found on an Internet Service Provider’s (ISP) Multiprotocol LabelSwitching (MPLS) network. What is its purpose?()
Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.
Drag the IOS commands from the left that would be used to implement a GRE tunnel using the10.1.1.0.30 network on interface serial 0/0 to the correct target area on the right.
Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()
Study the exhibit carefully.Routers A and B are customer routers. Routers 1, 2, 3 and 4 are provider routers. The routers areoperating with various IOS versions. Which frame mode MPLS configuration statement is true?()
Which statement correctly describes IPsec VPN backup technology?()
Drag the DSL technologies on the left to their maximum(down/up) data rate values on the below.
Drag and drop the steps in the process for provisioning a cable modem to connect to a headendon the above to the below in the order defined by the DOCSIS standard.