A. Information learned from one source is not distributed back to that source.
B. Routing updates from the poisoned source are ignored until a holddown timer expires.
C. Failed routes are advertised with infinite metrics.
D. New routing updates are ignored until the network has converged.
E. A route is marked as unavailable when its time-to-live is exceeded.
您可能感興趣的試卷
你可能感興趣的試題
A. It routes all traffic that is addresses to the destination network to the interface indicates in the routing table.
B. It sends a copy of its neighbor table to all adjacent routers.
C. It sends a multicast query packet to all adjacent neighbors requesting available routing paths to the destination network.
D. It broadcasts Hello packets to all routers in the network to re-establish neighbor adjacencies.
A. It is logically significant.
B. It is globally significant.
C. It is needed to identify a unique instance of an OSPF database.
D. It is an optional parameter required only if multiple OSPF processes are running on the router.
E. All routers in the same OSPF area must have the same process ID if they are to exchange routing information.
A. It immediately sends its entire routing table to its neighbors.
B. EIGRP sends a Hello packet to the DR to inform it of the route failure.
C. It automatically forwards traffic to a fallback default route until a successor route is found.
D. It sends queries out to neighbors until a new successor route is found.
E. It places the route in holddown until LSA updates inform it of a new route to the network.
A. Neighbor table
B. SPF table
C. RTP table
D. Topology table
E. Query table
F. DUAL table
A. The use of discontiguous subnets is not allowed
B. The use of variable length subnet masks is permitted
C. RIP v1 is a classless routing protocol
D. IGRP supports classless routing within the same autonomous system
E. RIP v2 supports classless routing
A. A successor route is used by EIGRP to forward traffic to destination.
B. Successor routes are saved in the topology table to be used if the primary route fails.
C. Successor routes are flagged as "active" in the routing table.
D. A successor route may be backed up by a feasible successor route.
E. Successor routes are stored in the neighbor table following the discovery process.
A. In the routing table only.
B. In the neighbor table only.
C. In the topology table only.
D. In the routing table and neighbor table.
E. In the routing table and topology table.
F. In the topology table and neighbor table.
A. point-to-point
B. Backbone area 0
C. Broadcast multicast
D. Non-broadcast multi-access
E. The DR/BDR process is done for all interface types
A. The update information will be added to the existing routing table.
B. The update information will replace the existing routing table entry.
C. The update will be ignored and thus no further action will occur.
D. The existing routing table entry will be purged from the routing table and all routers will attempt convergence.
A.90
B.100
C.110
D.120
E.130
F.170
G.200
最新試題
An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()
Which of the following correctly describe steps in the OSI data encapsulation process?()
What is the subnetwork address for a host with IP address 201.100.5.68/28?()
Which Frame Relay feature is responsible for transmitting keepalives to ensure that the PVC does not shut down because of inactivity?()
Which statement describes the rule of split horizon?()
Which of the following statements regarding routed and routing protocols are true?()
What is the purpose of typing o/r 0x2142 during a password recover procedure on a 2500 series router?()
What feature of a networks switch allows an administrative to create separate broadcast domains?()
What is a global command?()
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()