A. Information learned from one source is not distributed back to that source.
B. Routing updates from the poisoned source are ignored until a holddown timer expires.
C. Failed routes are advertised with infinite metrics.
D. New routing updates are ignored until the network has converged.
E. A route is marked as unavailable when its time-to-live is exceeded.
您可能感興趣的試卷
你可能感興趣的試題
A. It routes all traffic that is addresses to the destination network to the interface indicates in the routing table.
B. It sends a copy of its neighbor table to all adjacent routers.
C. It sends a multicast query packet to all adjacent neighbors requesting available routing paths to the destination network.
D. It broadcasts Hello packets to all routers in the network to re-establish neighbor adjacencies.
A. It is logically significant.
B. It is globally significant.
C. It is needed to identify a unique instance of an OSPF database.
D. It is an optional parameter required only if multiple OSPF processes are running on the router.
E. All routers in the same OSPF area must have the same process ID if they are to exchange routing information.
A. It immediately sends its entire routing table to its neighbors.
B. EIGRP sends a Hello packet to the DR to inform it of the route failure.
C. It automatically forwards traffic to a fallback default route until a successor route is found.
D. It sends queries out to neighbors until a new successor route is found.
E. It places the route in holddown until LSA updates inform it of a new route to the network.
A. Neighbor table
B. SPF table
C. RTP table
D. Topology table
E. Query table
F. DUAL table
A. The use of discontiguous subnets is not allowed
B. The use of variable length subnet masks is permitted
C. RIP v1 is a classless routing protocol
D. IGRP supports classless routing within the same autonomous system
E. RIP v2 supports classless routing
最新試題
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()
Which Frame Relay feature is responsible for transmitting keepalives to ensure that the PVC does not shut down because of inactivity?()
New switches have been purchased for a network upgrade. The objective for the network design emphasizes efficient, error-free transport instead of fast transport.Which switching mode should be configured on the new switches to provide error-free transport to the network? ()
A router with a serial interface will be used for an ISDN link.What other function group devices are required to complete the connection to the service provider? ()
An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()
How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()
What is the subnetwork address for a host with IP address 201.100.5.68/28?()
What is the purpose of pressing the Ctrl+Break keys during the router password recover procedure?()
A technician at TestKing needs to update the network documentation. One of the tasks includes documenting the name of the IOS image file of each router in the network.Which commands could be used to find this information?()
TestKing.com has allocated the IP add 199.144.27.0 is its network, to provide flexibility for the LAN design, a subnet mask of 255.255.255.240 has been chosen. Which of the following address can be assigned to LAN on the resulting subnets.()