A. Information learned from one source is not distributed back to that source.
B. Routing updates from the poisoned source are ignored until a holddown timer expires.
C. Failed routes are advertised with infinite metrics.
D. New routing updates are ignored until the network has converged.
E. A route is marked as unavailable when its time-to-live is exceeded.
您可能感興趣的試卷
你可能感興趣的試題
A. It routes all traffic that is addresses to the destination network to the interface indicates in the routing table.
B. It sends a copy of its neighbor table to all adjacent routers.
C. It sends a multicast query packet to all adjacent neighbors requesting available routing paths to the destination network.
D. It broadcasts Hello packets to all routers in the network to re-establish neighbor adjacencies.
A. It is logically significant.
B. It is globally significant.
C. It is needed to identify a unique instance of an OSPF database.
D. It is an optional parameter required only if multiple OSPF processes are running on the router.
E. All routers in the same OSPF area must have the same process ID if they are to exchange routing information.
A. It immediately sends its entire routing table to its neighbors.
B. EIGRP sends a Hello packet to the DR to inform it of the route failure.
C. It automatically forwards traffic to a fallback default route until a successor route is found.
D. It sends queries out to neighbors until a new successor route is found.
E. It places the route in holddown until LSA updates inform it of a new route to the network.
A. Neighbor table
B. SPF table
C. RTP table
D. Topology table
E. Query table
F. DUAL table
A. The use of discontiguous subnets is not allowed
B. The use of variable length subnet masks is permitted
C. RIP v1 is a classless routing protocol
D. IGRP supports classless routing within the same autonomous system
E. RIP v2 supports classless routing
最新試題
How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()
An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()
A technician at TestKing needs to update the network documentation. One of the tasks includes documenting the name of the IOS image file of each router in the network.Which commands could be used to find this information?()
What feature of a networks switch allows an administrative to create separate broadcast domains?()
What is the subnetwork address for a host with IP address 201.100.5.68/28?()
The network 172.12.0.0 needs to be divided into subnets where each subnet has the capacity of 458 IP addresses.What would be the correct subnet mask to accomplish this division keeping the number of subnets at the maximum? ()
Which of the following options lists the steps in PPP session establishment in the correct order?()
Identify three valid host addresses in the 192.168.27.0 network with a subnet mask of 255.255.255.240. ()
Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational? ()