Preview

Nt1330 Unit 4

Good Essays
Open Document
Open Document
1313 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 4
Top of Form
Which Layer 4 protocol does EIGRP use to provide reliability for the transmission of routing information?
Correct
Response
Your
Response

DUAL

IP

PDM

RTP

TCP

UDP
Bottom of Form

This item references content from the following areas:
CCNA Discovery: Introducing Routing and Switching in the Enterprise
5.3.4 EIGRP Neighbors and Adjacencies

4
Top of Form
A network administrator issues the command show ip route and observes this line of output:

192.168.3.0/24 [120/2] via 192.168.2.2, 00:00:05, Serial0/0

What two pieces of information can be obtained from the output? (Choose two.)
Correct
Response
Your
Response

RIP is the routing protocol that is configured.

This is a static route to network 192.168.3.0.

The metric for
…show more content…
Bottom of Form

This item references content from the following areas:
CCNA Discovery: Introducing Routing and Switching in the Enterprise
5.2.5 Verifying RIP

6
Top of Form
What two statements are correct regarding EIGRP authentication? (Choose two.)
Correct
Response
Your
Response

EIGRP authentication uses the MD5 algorithm.

EIGRP authentication uses a pre-shared key.

EIGRP authentication requires that both routers have the same key chain name.

EIGRP authentication uses varying levels of WEP to encrypt data exchanged between routers.

EIGRP authentication can be configured on one router and updates from this router are protected; whereas a neighbor router can be without the authentication configuration and its updates are unprotected.
Bottom of Form

This item references content from the following areas:
CCNA Discovery: Introducing Routing and Switching in the Enterprise
5.4.1 Configuring EIGRP

7
Top of Form

Refer to the exhibit. What three conclusions can be determined based on the exhibited commands? (Choose three.)
Correct
Response
Your
Response

A link-state routing protocol is used.

A distance vector routing protocol is used.

Routing information updates are broadcast every 30

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 5

    • 973 Words
    • 4 Pages

    A 100a Distribution Board will be used to power Block L. A ring circuit will provide power to the substation room and Generator/switch room (labelled Sockets, Generator/Switchroom). It will be protected by a 32A BS EN 60898 type C RCBO. The RCBO type C is used as equipment could either be plugged in from outside or attached to an inductive load. Another ring circuit will provide power for the workshop and restroom (labelled Sockets, Workshop/Restroom), this will also be protected by a 32A BS EN 60898 type c RCBO as again, equipment could be plugged in from outside or attached to an inductive load, as well as equipment being used within the restroom. The Electric Roller Shutter Door (labelled Motor Door) will be wired…

    • 973 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 3 Quiz

    • 1152 Words
    • 5 Pages

    192.168.0.2 is the next-hop address that is used by R3 to route a packet from the 10.0.0.0 network to the 172.16.0.0 network.…

    • 1152 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    nt 2640 studyguide

    • 720 Words
    • 3 Pages

    Out of the following which does a router normally use when making a decision about routing an IP packet?…

    • 720 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 7

    • 410 Words
    • 2 Pages

    AODV has pooled properties of both DSR and DSDV. It uses route discovery process for sustaining route information through the basis of routing table. It is a reactive protocol as it doesn’t need to establish or maintain routes to nodes that are not involved in the communication. AODV handles route discovery process with Route Request (RREQ) messages to broadcast to neighbour nodes. The message floods through the network till the desired destination is reached. Sequence number guarantees the loop freedom. The destination node at once receiving a RREQ unicasts a Route Reply (RREP) back to the source node. Node transmitting a RREP message creates routing table entries for forward route. For route maintenance, nodes send HELLO messages intermittently to neighbour nodes. If any node in the network miss the mark to receive three consecutive HELLO messages from its neighbour, it presumes that link to that particular node is down. A node that perceive a broken link directs a Route Error (RERR) message to any upstream node. At once a node receives a RERR message it will signpost a new source discovery process. The AODV protocol uses sequence numbers to determine the timeliness of each packet and to…

    • 410 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 8

    • 2459 Words
    • 10 Pages

    In a set of signals, if no signal can be represented as a linear combination of the remaining signals, then…

    • 2459 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2640 Lab Outline

    • 672 Words
    • 4 Pages

    EIGRP Route Tuning I Page 210 Page 213 5. EIGRP Serial…

    • 672 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 7

    • 458 Words
    • 2 Pages

    Identify the three IP address classes, the default subnet mask used with each, and the number of hosts for each.…

    • 458 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 4

    • 699 Words
    • 3 Pages

    Using filter, I found out the minimum number of defects by batch was zero, and the maximum number of defects by batch was twenty-three. Therefore, we can say that the number of defects that are more than ten are major problems and should be flagged. I chose ten as the number to base it on because when you compare the number of defects to the batch size (500, 1000, 5000 and10000) anything less than ten is rather small and is to be expected. Conditional formatting was used to highlight all defects which were greater than ten.…

    • 699 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 7

    • 855 Words
    • 4 Pages

    When performing a Live Migration using the Move the virtual machine’s data by selecting where to move the items option, which of the following advanced options would be the best to choose from to ensure that the folder structure remains the same on the destination server after the LM completes?…

    • 855 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1330 Unit 3

    • 273 Words
    • 2 Pages

    1. Identify and explain key trends that are occurring in computer peripheral devices? How do these trends affect business uses of computers?…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 3

    • 606 Words
    • 3 Pages

    What is the primary information system in this area? How is it effective in performing its role? With what systems does it interrelate in receiving data or sending data?…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Jain, Samir. "Routing and Remote Access Blog." Blogs. June 26, 2006. Accessed September 10, 2014.http://blogs.technet.com/b/rrasblog/archive/2006/06/26/438823.aspx.…

    • 390 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    172.29.0.0/16 subnetted to 113 subnets and provide information for subnets #1, #10, #26, and #113.…

    • 180 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Activity 1.7.1

    • 1271 Words
    • 6 Pages

    All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.…

    • 1271 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    MPLS intro from cicso

    • 23391 Words
    • 94 Pages

    It supports the creation of different routes between a source and a destination on a purely router-based…

    • 23391 Words
    • 94 Pages
    Powerful Essays

Related Topics