A. A successor route is used by EIGRP to forward traffic to destination.
B. Successor routes are saved in the topology table to be used if the primary route fails.
C. Successor routes are flagged as "active" in the routing table.
D. A successor route may be backed up by a feasible successor route.
E. Successor routes are stored in the neighbor table following the discovery process.
您可能感興趣的試卷
你可能感興趣的試題
A. In the routing table only.
B. In the neighbor table only.
C. In the topology table only.
D. In the routing table and neighbor table.
E. In the routing table and topology table.
F. In the topology table and neighbor table.
A. point-to-point
B. Backbone area 0
C. Broadcast multicast
D. Non-broadcast multi-access
E. The DR/BDR process is done for all interface types
A. The update information will be added to the existing routing table.
B. The update information will replace the existing routing table entry.
C. The update will be ignored and thus no further action will occur.
D. The existing routing table entry will be purged from the routing table and all routers will attempt convergence.
A.90
B.100
C.110
D.120
E.130
F.170
G.200
A RIP router has an entry in the routing table for a specific network destination. It then gets updated with another entry for that same destination, but with a higher path cost (hop count) than the one already in the routing table.
What will the router do in this situation?()
A. It will ignore the update and take no further action.
B. It will add the update information to its routing table.
C. It will replace the existing routing table entry with the update information.
D. It will delete the existing routing table and will send out hello packets to rebuild the routing table.
最新試題
Which of the following correctly describe steps in the OSI data encapsulation process?()
What should the configuration register value be after successfully completing the password recover procedure and returning the router to normal operation? ()
How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()
What is a global command?()
You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()
Which statement describes the rule of split horizon?()
What does a configuration Register Setting of 0x2105 indicate to the Router? ()
A Router with a BRI/T interface will be used for an ISDN Connection what other ISDN device is required to complete this connection? ()
A network host is configured as follows: Host IP address: 192.168.16.183 Subnet mask: 255.255.255.224 Default gateway: 192.168.16.190 Which of the following statements describe the network to which this host is attached?()
The following access list was applied outbound on he E0 interface connected to the 192.168.1.8/29 LAN:access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 anyaccess-list 123 deny tcp 192.168.1.9 0.0.0.7 eq 21 anyWhat effect will this access list have?()