Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) What command is used to stop RIP routing updates from exiting out an interface but still permit interface to receive RIP route updates?

A. Router(config-if)# no routing
B. Router(config-if)# passive-interface
C. Router(config-router)# passive-interface s0
D. Router(config-router)# no routing updates

problem 2) Two connected routers are configured with RIP routing. What would be the result when the router receives a routing update which contains a higher-cost path to the network already in its routing table?

A. The updated information will be added to existing routing table.
B. The update will be ignored and no further action will occur.
C. The updated information will replace existing routing table entry.
D. The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence.

problem 3) You type debug ip rip on your router console and see that 172.16.10.0 is being advertised to you with the metric of 16. What does this mean?

A. The route is 16 hops away.
B. The route has a delay of 16 microseconds.
C. The route is inaccessible.
D. The route is queued at 16 messages a second.

problem 4) The Corporate router receives an IP packet with a source IP address of 192.168.214.20 and a destination address of 192.168.22.3. Looking at the output from the Corporate router, what would the router do with this packet?
Corp#sh ip route
[output cut]

R    192.168.215.0 [120/2] via 192.168.20.2, 00:00:23, Serial0/0
R    192.168.115.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0
R    192.168.30.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0
C    192.168.20.0 is directly connected, Serial0/0
C    192.168.214.0 is directly connected, FastEthernet0/0

A. The packet would be discarded.
B. The packet would be routed out the S0/0 interface.
C. The router would broadcast looking for the destination.
D. The packet would be routed out the Fa0/0 interface.

problem 5) If your routing table has the static, a RIP, and an IGRP route to the same network, which route would be used to route packets by default?

A. Any available route
B. RIP route
C. Static route
D. IGRP route
E. They will all load-balance.

problem 6) What is route poisoning?

A. It sends back protocol received from the router as a poison pill, which stops the regular updates.
B. It is information received from a router that can not be sent back to the originating router.
C. It prevents regular update messages from reinstating a route that has just come up.
D. It describes when the router sets the metric for a downed link to infinity.

problem 7) Which of the following is true regarding RIPv2?

A. It has lower administrative distance than RIPv1.
B. It converges faster than RIPv1.
C. It has the same timers as RIPv1.
D. It is harder to configure than RIPv1.

problem 8) Network administrator views the output from the show ip route command. A network which is advertised by both RIP and IGRP appears in routing table flagged as the IGRP route. Why is the RIP route to this network not used in the routing table?

A. IGRP has a faster update timer.
B. IGRP has lower administrative distance.
C. RIP has higher metric value for that route.
D. The IGRP route has fewer hops.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95150
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question? 


Related Questions in Computer Network & Security

Write answer to each question - two paragraphs for each

Write answer to each question - two paragraphs for each question with single spaces. Format : Single Spaced Strong Paragraphs Two paragraphs for each question Times New Roman - 12 subject: Data Communication and Network ...

Concepts and strategies for managing securityassignment

Concepts and Strategies for managing security Assignment Brief As part of the formal assessment for the MSc Information Systems you are required to submit a Information Systems Security assignment. Please refer to your S ...

I encourage you to use latex but even if you dont please

I encourage you to use Latex, but even if you don't, please type your answers or hand write nicely. Explain your argument in a brief and precise way. 1. In a symmetric cryptosystem, Alice and Bob both know the e-key and ...

Coit20261 network routing and switching assignment-

COIT20261 Network Routing and Switching Assignment- Objectives - This assessment task requires you to demonstrate your knowledge of basic routing concepts by completing a number of exercise questions. Instructions - You ...

Summarize what pki is and how it works include the use of a

Summarize what PKI is and how it works. Include the use of a CA and also include why the backing up of these keys is so important. Directions: Your completed assignment should be at least 2 FULL double-spaced pages in le ...

Project- sample cyber security profileevery organization

Project- Sample Cyber Security Profile Every organization must create a cybersecurity profile (system security plan (SSP)) for all of its major and minor information systems. The cybersecurity profile documents the curre ...

Corporate profile cybersecurity risk profilefor this paper

Corporate Profile: Cybersecurity Risk Profile For this paper, you will construct a cybersecurityrisk profile for the company that you wrote about in Part 1 of the Corporate Profile project. Your risk profile, which inclu ...

A cipher can be created by using a keyword for example if

A cipher can be created by using a keyword. For example, if we choose "statistic" as our keyword, our cipher would be determined as follows: Method I. Write the word "statistic" without the repeated letters. Then complet ...

Ten immutable laws of security please respond to the

"Ten Immutable Laws of Security" Please respond to the following: • From the e-Activity, read the full article posted at https://technet.microsoft.com/en-us/library/hh278941.aspx titled "Ten Immutable Laws of Security (V ...

Assignment questionsquestion 1 assuming you can do 230

Assignment Questions Question 1. Assuming you can do 2 30 encryptions per second and key size is 64 bits: i. How long would a brute force attack take? (Both maximum and average values) ii. Give a scenario where this woul ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate