SlideShare a Scribd company logo
2
Most read
3
Most read
Chapter 7

True/False
Indicate whether the statement is true or false.

____    1. Peer-to-peer networks pass packets between multiple networks.

____    2. NetBEUI cannot scale into large internetworks because it cannot hold Network layer information in its
           network header.

____    3. IPX/SPX can be routed across the Internet.

____    4. Routers use metrics to determine which routes are better than other routes.

____    5. For the RIP (version 1) routing protocol, hop count is the sole metric used to determine the relative
           desirability of a particular path.


Multiple Choice
Identify the choice that best completes the statement or answers the question.

____    6. ____ protocols have packet headers that can contain Network layer addresses.
           a. Routed                                      c. NetBEUI
           b. Nonrouted                                   d. NetBIOS

____    7. ____ is a proprietary protocol suite developed by Novell.
           a. NetBIOS                                      c. IPX/SPX
           b. NetBEUI                                      d. TCP/IP
____    8. An autonomous system (AS) uses ____ as routing protocols.
           a. Exterior Gateway Protocols               c. Limit Gateway Protocols
           b. Border Gateway Protocols                 d. Interior Gateway Protocols
____    9. ____ routing protocols broadcast their entire routing table to each neighbor router at predetermined intervals.
           a. Link-state                                    c. Distance-state
           b. Distance-vector                               d. Link-vector
____ 10. ____ are often referred to as count-to-infinity problems because loops, without preventive measures, will
         cause packets to bounce around the internetwork infinitely.
         a. Hop loops                                      c. Routing loops
         b. Routing hops                                   d. Hop counts
____ 11. ____ controls what information a router will send out through a particular interface.
         a. Defining a maximum                           c. Defining a minimum
         b. Split horizon                                d. Split maximum

____ 12. ____, which are the packets used to send out LSAs, allow every router in the internetwork to share a common
         view of the topology of the internetwork.
         a. SPFs                                        c. EGPs
         b. OSPFs                                       d. LSPs
____ 13. ____ is a distance-vector routing protocol that broadcasts entire routing tables to neighbors every 30 seconds,
         out of every interface.
         a. RIP                                           c. BGP
         b. OSPF                                          d. EIGRP
____ 14. The Cisco ____ command turns on RIP routing for a network.
         a. rip                                      c. routing rip
         b. network                                  d. rip ip on

____ 15. You use the ____ command to display the routing table.
         a. show ip route                              c. show rip
         b. show route                                 d. rip table
____ 16. The ____ is the time at which a route will be totally removed from the routing table if no updates are
         received.
         a. rip interval                                  c. hop count
         b. administrative distance                       d. flush interval
____ 17. The ____ command displays real-time rip updates being sent and received and places very high processing
         demands on your router, which could affect network performance.
         a. show ip rip                                c. debug ip rip
         b. show ip protocol                           d. debug ip protocol
____ 18. The ____ command allows you to set the maximum hop count for IGRP.
         a. metric maximum-hops                      c. metric hops
         b. igrp maximum-hops                        d. maximum-hops
____ 19. Routers with only one route out are known as ____.
         a. static routers                              c. stub routers
         b. hub routers                                 d. start routers
____ 20. Networks with one route to the Internet are called ____.
         a. hub networks                                  c. start networks
         b. static networks                               d. stub networks

____ 21. Static routes are configured by a network administrator using the ____ command.
         a. static route                                c. static ip
         b. ip route                                    d. stub route
____ 22. ____ are very powerful, as they allow administrators complete control over path selection.
         a. RIP routes                                  c. Static routes
         b. Dynamic routes                              d. Stub routes
____ 23. The ____ command allows you to configure an administrative distance.
         a. ip distance                              c. adm distance
         b. ip route                                 d. adm route
____ 24. A ____ route is a type of static route that the administrator configures.
         a. stub                                           c. breakfall
         b. hub                                            d. default

____ 25. When IP routing is enabled, you can use the ____ command or the ip route 0.0.0.0 0.0.0.0
         command to configure a default route.
         a. ip default-network                          c. ip network default
b. ip default                                   d. ip default 0.0.0.0
____ 26. Default routes are sometimes called ____ routes.
         a. fallback                                    c. network
         b. break                                       d. quad zero


Completion
Complete each statement.

       27. Early networks were sometimes configured as ____________________ networks, in which computers
           communicate with and provide services to their “peers.”

       28. ____________________ are protocols used by routers to make path determination choices and to share those
           choices with other routers.

       29. A(n) _________________________ is a group of routers under the control of a single administration.

       30. ____________________ is a state where all routers on the internetwork share a common view of the
           internetwork routes.

       31. Routers configured with a link-state routing protocol use ______________________________ to inform
           neighbor routers on the internetwork.


Matching

            Match each item with a statement below:
            a. NetBEUI                                      f.   Hold-down timer
            b. Routed protocols                             g.   Link-state packets
            c. Hop count                                    h.   RIP
            d. Metric                                       i.   Administrative distance
            e. BGP
____ 32. a common technique used to stop routing loops
____ 33. the most commonly used distance-vector protocol
____ 34. developed to support networks consisting of multiple networks or subnetworks
____ 35. the number of routers a packet must pass through to reach a particular network
____ 36. value used to determine the reliability of the information regarding a particular route
____ 37. packets used to send out LSAs
____ 38. value used to define the suitability of a particular route
____ 39. an example of an EGP
____ 40. the most common nonroutable protocol


Short Answer
41. Briefly describe NetBEUI.

42. Briefly describe Enhanced Interior Gateway Routing Protocol (EIGRP).

43. How can you limit count-to-infinity problems by defining a maximum?

44. What are some of the drawbacks of using link-state routing protocols?

45. What are some of the attributes of RIP?

46. What is administrative distance?

47. Briefly describe IGRP.

48. What are the metrics that can be configured for IGRP?

49. How can you change a route administrative distance?

50. How can you configure a default route?
Ad

Recommended

CCNA Network Devices Questions
CCNA Network Devices Questions
Dsunte Wilson
 
CCNA Router and IOS Basics Questions
CCNA Router and IOS Basics Questions
Dsunte Wilson
 
CCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols Questions
Dsunte Wilson
 
CCNA IP Addressing
CCNA IP Addressing
Dsunte Wilson
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration Questions
Dsunte Wilson
 
CCNA Network Services Questions
CCNA Network Services Questions
Dsunte Wilson
 
CCNA Access Lists Questions
CCNA Access Lists Questions
Dsunte Wilson
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay Questions
Dsunte Wilson
 
CCNA TCP/IP Questions
CCNA TCP/IP Questions
Dsunte Wilson
 
Chapter 10
Chapter 10
guest35417d
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
Dsunte Wilson
 
CCNA Introducing Networks Questions
CCNA Introducing Networks Questions
Dsunte Wilson
 
Chapter 08
Chapter 08
guest35417d
 
05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree
gopi1985
 
CCNA Dec, 2015 Questions
CCNA Dec, 2015 Questions
Eng. Emad Al-Atoum
 
Ch22
Ch22
Balaji Prasath Madhaiyan
 
Ec8551 communication networks mcq question bank
Ec8551 communication networks mcq question bank
JAIGANESH SEKAR
 
Inter quiz
Inter quiz
kmanishuli
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)
Sachii Dosti
 
Basic linux commands
Basic linux commands
Aniket Thakur
 
4 implementation
4 implementation
hanmya
 
Networking
Networking
Becky Becky
 
Arp Dan Ipconfig Syntax
Arp Dan Ipconfig Syntax
guestcc37e8c
 
M Qi Series Linux
M Qi Series Linux
Frederick James Rathweg
 
Juniper mpls best practice part 2
Juniper mpls best practice part 2
Febrian ‎
 
I Pv6 Now! Decix Tech Meeting #9
I Pv6 Now! Decix Tech Meeting #9
flyingpotato
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Prescriptive Topology Daemon - ptmd
Prescriptive Topology Daemon - ptmd
Nat Morris
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
Dsunte Wilson
 
CCNA Routing Protocols
CCNA Routing Protocols
Dsunte Wilson
 

More Related Content

What's hot (20)

CCNA TCP/IP Questions
CCNA TCP/IP Questions
Dsunte Wilson
 
Chapter 10
Chapter 10
guest35417d
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
Dsunte Wilson
 
CCNA Introducing Networks Questions
CCNA Introducing Networks Questions
Dsunte Wilson
 
Chapter 08
Chapter 08
guest35417d
 
05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree
gopi1985
 
CCNA Dec, 2015 Questions
CCNA Dec, 2015 Questions
Eng. Emad Al-Atoum
 
Ch22
Ch22
Balaji Prasath Madhaiyan
 
Ec8551 communication networks mcq question bank
Ec8551 communication networks mcq question bank
JAIGANESH SEKAR
 
Inter quiz
Inter quiz
kmanishuli
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)
Sachii Dosti
 
Basic linux commands
Basic linux commands
Aniket Thakur
 
4 implementation
4 implementation
hanmya
 
Networking
Networking
Becky Becky
 
Arp Dan Ipconfig Syntax
Arp Dan Ipconfig Syntax
guestcc37e8c
 
M Qi Series Linux
M Qi Series Linux
Frederick James Rathweg
 
Juniper mpls best practice part 2
Juniper mpls best practice part 2
Febrian ‎
 
I Pv6 Now! Decix Tech Meeting #9
I Pv6 Now! Decix Tech Meeting #9
flyingpotato
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Prescriptive Topology Daemon - ptmd
Prescriptive Topology Daemon - ptmd
Nat Morris
 
CCNA TCP/IP Questions
CCNA TCP/IP Questions
Dsunte Wilson
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
Dsunte Wilson
 
CCNA Introducing Networks Questions
CCNA Introducing Networks Questions
Dsunte Wilson
 
05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree
gopi1985
 
Ec8551 communication networks mcq question bank
Ec8551 communication networks mcq question bank
JAIGANESH SEKAR
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)
Sachii Dosti
 
Basic linux commands
Basic linux commands
Aniket Thakur
 
4 implementation
4 implementation
hanmya
 
Arp Dan Ipconfig Syntax
Arp Dan Ipconfig Syntax
guestcc37e8c
 
Juniper mpls best practice part 2
Juniper mpls best practice part 2
Febrian ‎
 
I Pv6 Now! Decix Tech Meeting #9
I Pv6 Now! Decix Tech Meeting #9
flyingpotato
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Prescriptive Topology Daemon - ptmd
Prescriptive Topology Daemon - ptmd
Nat Morris
 

Viewers also liked (15)

CCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
Dsunte Wilson
 
CCNA Routing Protocols
CCNA Routing Protocols
Dsunte Wilson
 
Introduction to oracle primavera
Introduction to oracle primavera
Dsunte Wilson
 
CCNA IP Addressing
CCNA IP Addressing
Dsunte Wilson
 
Ccna 1 chapter 11 v4.0 answers 2011
Ccna 1 chapter 11 v4.0 answers 2011
Dân Chơi
 
Energie nucleaire
Energie nucleaire
CinemaTICE
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
Dsunte Wilson
 
CCNA Router Startup and Configuration
CCNA Router Startup and Configuration
Dsunte Wilson
 
CCNA PPP and Frame Relay
CCNA PPP and Frame Relay
Dsunte Wilson
 
CCNA TCP/IP
CCNA TCP/IP
Dsunte Wilson
 
CCNA Access Lists
CCNA Access Lists
Dsunte Wilson
 
CCNA Network Services
CCNA Network Services
Dsunte Wilson
 
CCNA Network Devices
CCNA Network Devices
Dsunte Wilson
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
Dsunte Wilson
 
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
jlealleon
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
Dsunte Wilson
 
CCNA Routing Protocols
CCNA Routing Protocols
Dsunte Wilson
 
Introduction to oracle primavera
Introduction to oracle primavera
Dsunte Wilson
 
Ccna 1 chapter 11 v4.0 answers 2011
Ccna 1 chapter 11 v4.0 answers 2011
Dân Chơi
 
Energie nucleaire
Energie nucleaire
CinemaTICE
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
Dsunte Wilson
 
CCNA Router Startup and Configuration
CCNA Router Startup and Configuration
Dsunte Wilson
 
CCNA PPP and Frame Relay
CCNA PPP and Frame Relay
Dsunte Wilson
 
CCNA Network Services
CCNA Network Services
Dsunte Wilson
 
CCNA Network Devices
CCNA Network Devices
Dsunte Wilson
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
Dsunte Wilson
 
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
jlealleon
 
Ad

Similar to CCNA Routing Protocols Questions (20)

Computer Networking MCQ (Network Topology Question)
Computer Networking MCQ (Network Topology Question)
SONU HEETSON
 
1- which oh the following might be used by a company to satisfy its gr.docx
1- which oh the following might be used by a company to satisfy its gr.docx
pandoragardner78605
 
Network layer
Network layer
HamzahMohammed4
 
Network layer ip address assignment and routing
Network layer ip address assignment and routing
HamzahMohammed4
 
Subneting and vlsm ntpg
Subneting and vlsm ntpg
Sachii Dosti
 
Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011
Dân Chơi
 
RIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme Networks
Dani Royman Simanjuntak
 
routing in computer networks for btech.pptx
routing in computer networks for btech.pptx
RohanRathi17
 
1737674082397_LEnnnnnnCTURE 0nn2 (a).pptx
1737674082397_LEnnnnnnCTURE 0nn2 (a).pptx
nyalawemgunga
 
computer pdf revision for all aspirants123456
computer pdf revision for all aspirants123456
manishazapclub111
 
Routing and switching question1
Routing and switching question1
Md. Mashiur Rahman
 
IP ROUTING
IP ROUTING
anilinvns
 
Samples of competitive examination questions: part II
Samples of competitive examination questions: part II
Ali I. Al-Mosawi
 
Network layer tanenbaum
Network layer tanenbaum
Mahesh Kumar Chelimilla
 
Lesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing A
Mahmmoud Mahdi
 
Day 2 IP ROUTING
Day 2 IP ROUTING
anilinvns
 
Network (FE)
Network (FE)
Tanat Tonguthaisri
 
ROUTING
ROUTING
Publicis Sapient
 
Real JN0-280 Dumps (V8.02) - Help You Crack JN0-280 Exam Quickly.pdf
Real JN0-280 Dumps (V8.02) - Help You Crack JN0-280 Exam Quickly.pdf
yarusun
 
Cisco labs practical5
Cisco labs practical5
Tai Lam
 
Computer Networking MCQ (Network Topology Question)
Computer Networking MCQ (Network Topology Question)
SONU HEETSON
 
1- which oh the following might be used by a company to satisfy its gr.docx
1- which oh the following might be used by a company to satisfy its gr.docx
pandoragardner78605
 
Network layer ip address assignment and routing
Network layer ip address assignment and routing
HamzahMohammed4
 
Subneting and vlsm ntpg
Subneting and vlsm ntpg
Sachii Dosti
 
Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011
Dân Chơi
 
RIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme Networks
Dani Royman Simanjuntak
 
routing in computer networks for btech.pptx
routing in computer networks for btech.pptx
RohanRathi17
 
1737674082397_LEnnnnnnCTURE 0nn2 (a).pptx
1737674082397_LEnnnnnnCTURE 0nn2 (a).pptx
nyalawemgunga
 
computer pdf revision for all aspirants123456
computer pdf revision for all aspirants123456
manishazapclub111
 
Routing and switching question1
Routing and switching question1
Md. Mashiur Rahman
 
Samples of competitive examination questions: part II
Samples of competitive examination questions: part II
Ali I. Al-Mosawi
 
Lesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing A
Mahmmoud Mahdi
 
Day 2 IP ROUTING
Day 2 IP ROUTING
anilinvns
 
Real JN0-280 Dumps (V8.02) - Help You Crack JN0-280 Exam Quickly.pdf
Real JN0-280 Dumps (V8.02) - Help You Crack JN0-280 Exam Quickly.pdf
yarusun
 
Cisco labs practical5
Cisco labs practical5
Tai Lam
 
Ad

More from Dsunte Wilson (8)

SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
Dsunte Wilson
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
Dsunte Wilson
 
CCNA Advanced Switching
CCNA Advanced Switching
Dsunte Wilson
 
CCNA Router and IOS Basics
CCNA Router and IOS Basics
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
Dsunte Wilson
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
Dsunte Wilson
 
CCNA Advanced Switching
CCNA Advanced Switching
Dsunte Wilson
 
CCNA Router and IOS Basics
CCNA Router and IOS Basics
Dsunte Wilson
 

Recently uploaded (20)

Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
10 Key Challenges for AI within the EU Data Protection Framework.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
 
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
 
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
Edge AI and Vision Alliance
 
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
OpenPOWER Foundation & Open-Source Core Innovations
OpenPOWER Foundation & Open-Source Core Innovations
IBM
 
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
 
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Josef Weingand
 
PyCon SG 25 - Firecracker Made Easy with Python.pdf
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
 
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
 
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
 
2025_06_18 - OpenMetadata Community Meeting.pdf
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
 
The Future of Product Management in AI ERA.pdf
The Future of Product Management in AI ERA.pdf
Alyona Owens
 
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
 
Securing AI - There Is No Try, Only Do!.pdf
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
 
UserCon Belgium: Honey, VMware increased my bill
UserCon Belgium: Honey, VMware increased my bill
stijn40
 
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
10 Key Challenges for AI within the EU Data Protection Framework.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
 
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
 
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
Edge AI and Vision Alliance
 
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
OpenPOWER Foundation & Open-Source Core Innovations
OpenPOWER Foundation & Open-Source Core Innovations
IBM
 
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
 
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Josef Weingand
 
PyCon SG 25 - Firecracker Made Easy with Python.pdf
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
 
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
 
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
 
2025_06_18 - OpenMetadata Community Meeting.pdf
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
 
The Future of Product Management in AI ERA.pdf
The Future of Product Management in AI ERA.pdf
Alyona Owens
 
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
 
Securing AI - There Is No Try, Only Do!.pdf
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
 
UserCon Belgium: Honey, VMware increased my bill
UserCon Belgium: Honey, VMware increased my bill
stijn40
 

CCNA Routing Protocols Questions

  • 1. Chapter 7 True/False Indicate whether the statement is true or false. ____ 1. Peer-to-peer networks pass packets between multiple networks. ____ 2. NetBEUI cannot scale into large internetworks because it cannot hold Network layer information in its network header. ____ 3. IPX/SPX can be routed across the Internet. ____ 4. Routers use metrics to determine which routes are better than other routes. ____ 5. For the RIP (version 1) routing protocol, hop count is the sole metric used to determine the relative desirability of a particular path. Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 6. ____ protocols have packet headers that can contain Network layer addresses. a. Routed c. NetBEUI b. Nonrouted d. NetBIOS ____ 7. ____ is a proprietary protocol suite developed by Novell. a. NetBIOS c. IPX/SPX b. NetBEUI d. TCP/IP ____ 8. An autonomous system (AS) uses ____ as routing protocols. a. Exterior Gateway Protocols c. Limit Gateway Protocols b. Border Gateway Protocols d. Interior Gateway Protocols ____ 9. ____ routing protocols broadcast their entire routing table to each neighbor router at predetermined intervals. a. Link-state c. Distance-state b. Distance-vector d. Link-vector ____ 10. ____ are often referred to as count-to-infinity problems because loops, without preventive measures, will cause packets to bounce around the internetwork infinitely. a. Hop loops c. Routing loops b. Routing hops d. Hop counts ____ 11. ____ controls what information a router will send out through a particular interface. a. Defining a maximum c. Defining a minimum b. Split horizon d. Split maximum ____ 12. ____, which are the packets used to send out LSAs, allow every router in the internetwork to share a common view of the topology of the internetwork. a. SPFs c. EGPs b. OSPFs d. LSPs
  • 2. ____ 13. ____ is a distance-vector routing protocol that broadcasts entire routing tables to neighbors every 30 seconds, out of every interface. a. RIP c. BGP b. OSPF d. EIGRP ____ 14. The Cisco ____ command turns on RIP routing for a network. a. rip c. routing rip b. network d. rip ip on ____ 15. You use the ____ command to display the routing table. a. show ip route c. show rip b. show route d. rip table ____ 16. The ____ is the time at which a route will be totally removed from the routing table if no updates are received. a. rip interval c. hop count b. administrative distance d. flush interval ____ 17. The ____ command displays real-time rip updates being sent and received and places very high processing demands on your router, which could affect network performance. a. show ip rip c. debug ip rip b. show ip protocol d. debug ip protocol ____ 18. The ____ command allows you to set the maximum hop count for IGRP. a. metric maximum-hops c. metric hops b. igrp maximum-hops d. maximum-hops ____ 19. Routers with only one route out are known as ____. a. static routers c. stub routers b. hub routers d. start routers ____ 20. Networks with one route to the Internet are called ____. a. hub networks c. start networks b. static networks d. stub networks ____ 21. Static routes are configured by a network administrator using the ____ command. a. static route c. static ip b. ip route d. stub route ____ 22. ____ are very powerful, as they allow administrators complete control over path selection. a. RIP routes c. Static routes b. Dynamic routes d. Stub routes ____ 23. The ____ command allows you to configure an administrative distance. a. ip distance c. adm distance b. ip route d. adm route ____ 24. A ____ route is a type of static route that the administrator configures. a. stub c. breakfall b. hub d. default ____ 25. When IP routing is enabled, you can use the ____ command or the ip route 0.0.0.0 0.0.0.0 command to configure a default route. a. ip default-network c. ip network default
  • 3. b. ip default d. ip default 0.0.0.0 ____ 26. Default routes are sometimes called ____ routes. a. fallback c. network b. break d. quad zero Completion Complete each statement. 27. Early networks were sometimes configured as ____________________ networks, in which computers communicate with and provide services to their “peers.” 28. ____________________ are protocols used by routers to make path determination choices and to share those choices with other routers. 29. A(n) _________________________ is a group of routers under the control of a single administration. 30. ____________________ is a state where all routers on the internetwork share a common view of the internetwork routes. 31. Routers configured with a link-state routing protocol use ______________________________ to inform neighbor routers on the internetwork. Matching Match each item with a statement below: a. NetBEUI f. Hold-down timer b. Routed protocols g. Link-state packets c. Hop count h. RIP d. Metric i. Administrative distance e. BGP ____ 32. a common technique used to stop routing loops ____ 33. the most commonly used distance-vector protocol ____ 34. developed to support networks consisting of multiple networks or subnetworks ____ 35. the number of routers a packet must pass through to reach a particular network ____ 36. value used to determine the reliability of the information regarding a particular route ____ 37. packets used to send out LSAs ____ 38. value used to define the suitability of a particular route ____ 39. an example of an EGP ____ 40. the most common nonroutable protocol Short Answer
  • 4. 41. Briefly describe NetBEUI. 42. Briefly describe Enhanced Interior Gateway Routing Protocol (EIGRP). 43. How can you limit count-to-infinity problems by defining a maximum? 44. What are some of the drawbacks of using link-state routing protocols? 45. What are some of the attributes of RIP? 46. What is administrative distance? 47. Briefly describe IGRP. 48. What are the metrics that can be configured for IGRP? 49. How can you change a route administrative distance? 50. How can you configure a default route?