Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) What command is used to stop RIP routing updates from exiting out an interface but still permit interface to receive RIP route updates?

A. Router(config-if)# no routing
B. Router(config-if)# passive-interface
C. Router(config-router)# passive-interface s0
D. Router(config-router)# no routing updates

problem 2) Two connected routers are configured with RIP routing. What would be the result when the router receives a routing update which contains a higher-cost path to the network already in its routing table?

A. The updated information will be added to existing routing table.
B. The update will be ignored and no further action will occur.
C. The updated information will replace existing routing table entry.
D. The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence.

problem 3) You type debug ip rip on your router console and see that 172.16.10.0 is being advertised to you with the metric of 16. What does this mean?

A. The route is 16 hops away.
B. The route has a delay of 16 microseconds.
C. The route is inaccessible.
D. The route is queued at 16 messages a second.

problem 4) The Corporate router receives an IP packet with a source IP address of 192.168.214.20 and a destination address of 192.168.22.3. Looking at the output from the Corporate router, what would the router do with this packet?
Corp#sh ip route
[output cut]

R    192.168.215.0 [120/2] via 192.168.20.2, 00:00:23, Serial0/0
R    192.168.115.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0
R    192.168.30.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0
C    192.168.20.0 is directly connected, Serial0/0
C    192.168.214.0 is directly connected, FastEthernet0/0

A. The packet would be discarded.
B. The packet would be routed out the S0/0 interface.
C. The router would broadcast looking for the destination.
D. The packet would be routed out the Fa0/0 interface.

problem 5) If your routing table has the static, a RIP, and an IGRP route to the same network, which route would be used to route packets by default?

A. Any available route
B. RIP route
C. Static route
D. IGRP route
E. They will all load-balance.

problem 6) What is route poisoning?

A. It sends back protocol received from the router as a poison pill, which stops the regular updates.
B. It is information received from a router that can not be sent back to the originating router.
C. It prevents regular update messages from reinstating a route that has just come up.
D. It describes when the router sets the metric for a downed link to infinity.

problem 7) Which of the following is true regarding RIPv2?

A. It has lower administrative distance than RIPv1.
B. It converges faster than RIPv1.
C. It has the same timers as RIPv1.
D. It is harder to configure than RIPv1.

problem 8) Network administrator views the output from the show ip route command. A network which is advertised by both RIP and IGRP appears in routing table flagged as the IGRP route. Why is the RIP route to this network not used in the routing table?

A. IGRP has a faster update timer.
B. IGRP has lower administrative distance.
C. RIP has higher metric value for that route.
D. The IGRP route has fewer hops.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95150
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question? 


Related Questions in Computer Network & Security

Assignmentyou have been hired as the chief security officer

Assignment You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security program to ensure that a ...

Presentation - tool comparisonat this point you have been

Presentation - Tool Comparison At this point, you have been introduced to various security tools (Network Discovery, Network Scanning, DLP, Firewalls, and HIDS). You are to take one of the five identified categories of t ...

Develop a network security plan for a medical record

Develop a Network Security Plan for a Medical Record Company. As a network administrator you are required to develop a brand new security plan. The medical record company consists of the following individuals: Doctors, N ...

Taskprovide short answers to the following six questions

Task Provide short answers to the following six questions. Your answers should be clear, concise and to the point. Prepare a single document (MS Word or PDF, NOT both) along with title page and submit it online using EAS ...

Assignment designing compliance within the lan-to-wan

Assignment: Designing Compliance within the LAN-to-WAN Domain Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, ...

Assignment elastic and inelastic trafficwrite a three to

Assignment: Elastic and Inelastic Traffic Write a three to four page paper in which you: 1. Outline a plan for the development of an addressing and naming model in an environment of the following scenario: o Ten departme ...

Short papercompare and contrast cat 6 unshielded twisted

Short Paper Compare and contrast cat. 6 unshielded twisted pair (UTP), coaxial, and single mode fiber optic cabling types. Describe one or two of the advantages and/or disadvantages associated with using each cable type ...

What is a dmz is this really a good name for the function

What is a DMZ? Is this really a good name for the function that this type of subnet performs? What is RADIUS? What advantage does it have over TACACS? How does a network-based IDPS differ from a host-based IDPS? What is ...

Network security- as a corporate network administrator the

"Network Security" - As a corporate network administrator the industry standard suggests your job is to maintain the confidentiality, availability, and integrity of all network resources. Choose an attack that affects on ...

Threat management and disaster recovery final paper this is

Threat Management and Disaster Recovery Final Paper This is a two part assignment that will be submitted as one final paper Part 1 I would like you to complete a limited Risk Assessment for a fictional enterprise. This a ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro