The Testking network is utilizing RIP as the IP routing protocol. Router TK1 learns how to reach the same destination via 6 different paths. All paths have the same metric and administrative distance.
With all routers using the default operation,which of the paths will be chosen to reach the destination?()
A. Only the first two paths that are learned.
B. Four of the paths.
C. All six routes in a routed robin fashion.
D. The oldest two paths in the routing table.
E. The first path learned to the destination network.
您可能感興趣的試卷
你可能感興趣的試題
A. Discontiguous subnets are not allowed.
B. Variable length subnet masks are allowed.
C. RIP v1 is a classless routing protocol.
D. IGRP supports classless routing within the same autonomous system.
E. RIP v2 supports classless routing.
A. Only routers can split boundaries (horizons) between concentric networks.
B. Each AS must keep routing tables converged to prevent dead routes from being advertised across boundaries.
C. Networks can only remain fully converged if all information is sent out all active interfaces.
D. Information about a route should not be sent back in the direction from which the original update came.
E. Distance vector protocols need fall back routers that are responsible for momentary loops.
A. SPF packets
B. hello packets
C. keepalive packets
D. dead interval packets
E. LSU packets
A. LSAs from other routers
B. Beacons received on point-to-point links
C. hello packets
D. Routing tables received from neighbors
E. SAP packets sent by other routers
F. TTL packets from exclusive routers
A.127.0.0.1
B.192.168.0.5
C.223.0.0.1
D.172.16.0.1
E.224.0.0.5
F.254.255.255.255.255
最新試題
Which of the following describe router functions?()
Which of the following statements regarding routed and routing protocols are true?()
Which command is used to display the placement and direction of an IP access control list on a router?()
Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational? ()
What is the purpose of pressing the Ctrl+Break keys during the router password recover procedure?()
The following access list was applied outbound on he E0 interface connected to the 192.168.1.8/29 LAN:access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 anyaccess-list 123 deny tcp 192.168.1.9 0.0.0.7 eq 21 anyWhat effect will this access list have?()
Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts?()
Which of the following correctly describe steps in the OSI data encapsulation process?()
What does a configuration Register Setting of 0x2105 indicate to the Router? ()
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()