Deck 8: Advanced Routing Protocols

ملء الشاشة (f)
exit full mode
سؤال
Although it is often described as a hybrid protocol containing the features of both distance-vector and link-state protocols, EIGRP is still a ____ routing protocol at its core.

A) link-state
B) distance-vector
C) link-vector
D) distance-state
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
In general, ____ routing protocols flood nonperiodic link-state advertisements of only changed routes throughout the entire internetwork.

A) link-state
B) distance-vector
C) exterior gateway
D) interior gateway
سؤال
____ routing protocols cannot adapt to work in an environment where discontiguous networks or VLSM exist.

A) RIPv1
B) Classless
C) Classful
D) Class-oriented
سؤال
RIP authentication can occur either by passing the authentication keys in clear text or via ____ authentication.

A) SSH
B) RC4
C) MD5
D) SHA
سؤال
____ allow EIGRP to support multiple Network layer routed protocols such as IP, IPX, and AppleTalk.

A) Neighbor discovery and maintenance
B) Protocol Dependent Modules
C) Reliable Transport Protocol
D) Diffusing Update Algorithm (DUAL)
سؤال
The message update format in RIPv1 does not have room for subnet mask information in the IP address field.
سؤال
EIGRP uses multicast address ____ to multicast Hello packets every five seconds on most networks of T1 speed or greater.

A) 224.0.0.10
B) 224.224.0.1
C) 255.255.0.10
D) 255.255.255.10
سؤال
DUAL uses the ____ topology table to track the status of all links in a network.

A) EIGRP
B) OSPF
C) RIPv1
D) RIPv2
سؤال
In general, due to the complexity of modern networks and the use of VLSMs, which require subnet mask information to be sent with update messages, most networks use classful routing protocols.
سؤال
Because EIGRP is protocol-independent, it cannot use existing Transport layer protocols to carry its various packet types. Instead, Cisco developed an entirely new layer 4 protocol, the ____, for use by EIGRP.

A) Protocol Dependent Modules (PDM)
B) Reliable Transport Protocol (RTP)
C) Neighbor discovery and maintenance
D) Diffusing Update Algorithm (DUAL)
سؤال
The ____ table contains information about all the networks a router can reach.

A) RIP neighbors
B) OSPF status
C) EIGRP topology
D) RIPv1 topology
سؤال
EIGRP uses the same metric as IGRP multiplied by ____.

A) 32
B) 64
C) 128
D) 256
سؤال
Classful routing protocols can be used in networks with either discontiguous subnets or networks using variable length subnet masks (VLSM).
سؤال
____ allow EIGRP to discover neighbors and keep track of their status.

A) Reliable Transport Protocol
B) Protocol Dependent Modules
C) Neighbor discovery and maintenance
D) Diffusing Update Algorithm (DUAL)
سؤال
The ____ command switches RIP to version 2.

A) version 2
B) no auto-summary
C) rip2
D) rip 2 on
سؤال
The four bytes set aside for the ____ field allow RIPv2 to send the full 32-bit subnet mask for each network configured on the router's interfaces.

A) Next Hop
B) IP Address
C) Address Family Identifier
D) Subnet Mask
سؤال
The ____ command overrides RIPv2's default behavior of summarizing to major network boundaries.

A) no default
B) no default summary
C) auto-summary off
D) no auto-summary
سؤال
In general, ____ routing protocols send periodic updates of the entire routing table to their directly connected neighbors.

A) link-state
B) distance-vector
C) exterior gateway
D) interior gateway
سؤال
EIGRP uses nonperiodic, partial, and bounded routing table updates.
سؤال
OSPF is ideally suited for large networks because it can use a concept known as areas to bound link-state advertisements.
سؤال
Describe the Routing Information Protocol version 2.
سؤال
Describe the Enhanced Interior Gateway Routing Protocol (EIGRP).
سؤال
What are the major components of EIGRP?
سؤال
____ is an open standards, link-state routing protocol that supports classless routing, variable-length subnet masks, and authentication.

A) OSPF
B) EIGRP
C) RIPv1
D) IGRP
سؤال
A(n) ____ in OSPF is a router's interface.

A) link-state
B) cost
C) link
D) area
سؤال
How does RIPv2 authenticate routing peers?
سؤال
____________________ routing protocols offer the ability to carry subnet mask information in the routing table updates.
سؤال
What are the six factors used by EIGRP to calculate a route metric?
سؤال
__________________________________________________ is a Cisco proprietary protocol designed to overcome the limitations found in IGRP.
سؤال
____________________ routing protocols summarize networks to their major network boundaries (Class A, B, or C) and do not carry subnet mask information in their routing table updates.
سؤال
The ___________________________________ is the heart and soul of EIGRP, and is the reason that EIGRP can quickly recover from a link outage and route around network problems.
سؤال
___________________________________ allow EIGRP to carry multiple routed protocols within their own native packet formats.
سؤال
OSPF uses a(n) ____ database, which holds the common view of the network formed from the link-state advertisements that are received.

A) adjacencies
B) designated routers
C) link-state
D) topological
سؤال
What are the steps for configuring EIGRP authentication?
سؤال
In EIGRP, ____ is a good state, as it means all DUAL computations have been completed and the route is stable.

A) active
B) fixed
C) down
D) passive
سؤال
In OSPF, a(n) ____ is the portion of a network within which LSAs are contained.

A) domain
B) segment
C) container
D) area
سؤال
Describe the Open Shortest Path First (OSPF) protocol.
سؤال
What are the steps required to configure RIPv2 authentication?
سؤال
What are some of the key terms associated with the Diffusing Update Algorithm (DUAL)?
سؤال
In OSPF, the ____ database contains information about all OSPF peers with which a router has successfully exchanged Hello packets.

A) link-state
B) adjacencies
C) cost
D) topological
سؤال
Match between columns
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
Bandwidth
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
RIPv1
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
Hello packets
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
MD5
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
EIGRP
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
Hash
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
Reliable multicast
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
Routing table updates
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
MTU
a feature of RTP that requests an acknowledgment via unicast to a multicast message
Bandwidth
a feature of RTP that requests an acknowledgment via unicast to a multicast message
RIPv1
a feature of RTP that requests an acknowledgment via unicast to a multicast message
Hello packets
a feature of RTP that requests an acknowledgment via unicast to a multicast message
MD5
a feature of RTP that requests an acknowledgment via unicast to a multicast message
EIGRP
a feature of RTP that requests an acknowledgment via unicast to a multicast message
Hash
a feature of RTP that requests an acknowledgment via unicast to a multicast message
Reliable multicast
a feature of RTP that requests an acknowledgment via unicast to a multicast message
Routing table updates
a feature of RTP that requests an acknowledgment via unicast to a multicast message
MTU
the speed of the link
Bandwidth
the speed of the link
RIPv1
the speed of the link
Hello packets
the speed of the link
MD5
the speed of the link
EIGRP
the speed of the link
Hash
the speed of the link
Reliable multicast
the speed of the link
Routing table updates
the speed of the link
MTU
an example of an EIGRP packet type that uses reliable multicast via RTP
Bandwidth
an example of an EIGRP packet type that uses reliable multicast via RTP
RIPv1
an example of an EIGRP packet type that uses reliable multicast via RTP
Hello packets
an example of an EIGRP packet type that uses reliable multicast via RTP
MD5
an example of an EIGRP packet type that uses reliable multicast via RTP
EIGRP
an example of an EIGRP packet type that uses reliable multicast via RTP
Hash
an example of an EIGRP packet type that uses reliable multicast via RTP
Reliable multicast
an example of an EIGRP packet type that uses reliable multicast via RTP
Routing table updates
an example of an EIGRP packet type that uses reliable multicast via RTP
MTU
a classful routing protocol
Bandwidth
a classful routing protocol
RIPv1
a classful routing protocol
Hello packets
a classful routing protocol
MD5
a classful routing protocol
EIGRP
a classful routing protocol
Hash
a classful routing protocol
Reliable multicast
a classful routing protocol
Routing table updates
a classful routing protocol
MTU
a number generated by MD5 from the secret key
Bandwidth
a number generated by MD5 from the secret key
RIPv1
a number generated by MD5 from the secret key
Hello packets
a number generated by MD5 from the secret key
MD5
a number generated by MD5 from the secret key
EIGRP
a number generated by MD5 from the secret key
Hash
a number generated by MD5 from the secret key
Reliable multicast
a number generated by MD5 from the secret key
Routing table updates
a number generated by MD5 from the secret key
MTU
a classless routing protocol
Bandwidth
a classless routing protocol
RIPv1
a classless routing protocol
Hello packets
a classless routing protocol
MD5
a classless routing protocol
EIGRP
a classless routing protocol
Hash
a classless routing protocol
Reliable multicast
a classless routing protocol
Routing table updates
a classless routing protocol
MTU
allow EIGRP neighbors to determine if routing peers are still online and available
Bandwidth
allow EIGRP neighbors to determine if routing peers are still online and available
RIPv1
allow EIGRP neighbors to determine if routing peers are still online and available
Hello packets
allow EIGRP neighbors to determine if routing peers are still online and available
MD5
allow EIGRP neighbors to determine if routing peers are still online and available
EIGRP
allow EIGRP neighbors to determine if routing peers are still online and available
Hash
allow EIGRP neighbors to determine if routing peers are still online and available
Reliable multicast
allow EIGRP neighbors to determine if routing peers are still online and available
Routing table updates
allow EIGRP neighbors to determine if routing peers are still online and available
MTU
the maximum datagram size allowed on a link
Bandwidth
the maximum datagram size allowed on a link
RIPv1
the maximum datagram size allowed on a link
Hello packets
the maximum datagram size allowed on a link
MD5
the maximum datagram size allowed on a link
EIGRP
the maximum datagram size allowed on a link
Hash
the maximum datagram size allowed on a link
Reliable multicast
the maximum datagram size allowed on a link
Routing table updates
the maximum datagram size allowed on a link
MTU
سؤال
Briefly describe OSPF authentication.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Advanced Routing Protocols
1
Although it is often described as a hybrid protocol containing the features of both distance-vector and link-state protocols, EIGRP is still a ____ routing protocol at its core.

A) link-state
B) distance-vector
C) link-vector
D) distance-state
B
2
In general, ____ routing protocols flood nonperiodic link-state advertisements of only changed routes throughout the entire internetwork.

A) link-state
B) distance-vector
C) exterior gateway
D) interior gateway
A
3
____ routing protocols cannot adapt to work in an environment where discontiguous networks or VLSM exist.

A) RIPv1
B) Classless
C) Classful
D) Class-oriented
C
4
RIP authentication can occur either by passing the authentication keys in clear text or via ____ authentication.

A) SSH
B) RC4
C) MD5
D) SHA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
____ allow EIGRP to support multiple Network layer routed protocols such as IP, IPX, and AppleTalk.

A) Neighbor discovery and maintenance
B) Protocol Dependent Modules
C) Reliable Transport Protocol
D) Diffusing Update Algorithm (DUAL)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
The message update format in RIPv1 does not have room for subnet mask information in the IP address field.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
EIGRP uses multicast address ____ to multicast Hello packets every five seconds on most networks of T1 speed or greater.

A) 224.0.0.10
B) 224.224.0.1
C) 255.255.0.10
D) 255.255.255.10
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
DUAL uses the ____ topology table to track the status of all links in a network.

A) EIGRP
B) OSPF
C) RIPv1
D) RIPv2
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
In general, due to the complexity of modern networks and the use of VLSMs, which require subnet mask information to be sent with update messages, most networks use classful routing protocols.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
Because EIGRP is protocol-independent, it cannot use existing Transport layer protocols to carry its various packet types. Instead, Cisco developed an entirely new layer 4 protocol, the ____, for use by EIGRP.

A) Protocol Dependent Modules (PDM)
B) Reliable Transport Protocol (RTP)
C) Neighbor discovery and maintenance
D) Diffusing Update Algorithm (DUAL)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
The ____ table contains information about all the networks a router can reach.

A) RIP neighbors
B) OSPF status
C) EIGRP topology
D) RIPv1 topology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
EIGRP uses the same metric as IGRP multiplied by ____.

A) 32
B) 64
C) 128
D) 256
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
Classful routing protocols can be used in networks with either discontiguous subnets or networks using variable length subnet masks (VLSM).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
____ allow EIGRP to discover neighbors and keep track of their status.

A) Reliable Transport Protocol
B) Protocol Dependent Modules
C) Neighbor discovery and maintenance
D) Diffusing Update Algorithm (DUAL)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
The ____ command switches RIP to version 2.

A) version 2
B) no auto-summary
C) rip2
D) rip 2 on
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
The four bytes set aside for the ____ field allow RIPv2 to send the full 32-bit subnet mask for each network configured on the router's interfaces.

A) Next Hop
B) IP Address
C) Address Family Identifier
D) Subnet Mask
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
The ____ command overrides RIPv2's default behavior of summarizing to major network boundaries.

A) no default
B) no default summary
C) auto-summary off
D) no auto-summary
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
In general, ____ routing protocols send periodic updates of the entire routing table to their directly connected neighbors.

A) link-state
B) distance-vector
C) exterior gateway
D) interior gateway
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
EIGRP uses nonperiodic, partial, and bounded routing table updates.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
OSPF is ideally suited for large networks because it can use a concept known as areas to bound link-state advertisements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
Describe the Routing Information Protocol version 2.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
Describe the Enhanced Interior Gateway Routing Protocol (EIGRP).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
What are the major components of EIGRP?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
____ is an open standards, link-state routing protocol that supports classless routing, variable-length subnet masks, and authentication.

A) OSPF
B) EIGRP
C) RIPv1
D) IGRP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
A(n) ____ in OSPF is a router's interface.

A) link-state
B) cost
C) link
D) area
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
How does RIPv2 authenticate routing peers?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
____________________ routing protocols offer the ability to carry subnet mask information in the routing table updates.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
What are the six factors used by EIGRP to calculate a route metric?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
__________________________________________________ is a Cisco proprietary protocol designed to overcome the limitations found in IGRP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
____________________ routing protocols summarize networks to their major network boundaries (Class A, B, or C) and do not carry subnet mask information in their routing table updates.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
The ___________________________________ is the heart and soul of EIGRP, and is the reason that EIGRP can quickly recover from a link outage and route around network problems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
___________________________________ allow EIGRP to carry multiple routed protocols within their own native packet formats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
OSPF uses a(n) ____ database, which holds the common view of the network formed from the link-state advertisements that are received.

A) adjacencies
B) designated routers
C) link-state
D) topological
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
What are the steps for configuring EIGRP authentication?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
In EIGRP, ____ is a good state, as it means all DUAL computations have been completed and the route is stable.

A) active
B) fixed
C) down
D) passive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
In OSPF, a(n) ____ is the portion of a network within which LSAs are contained.

A) domain
B) segment
C) container
D) area
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
Describe the Open Shortest Path First (OSPF) protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
What are the steps required to configure RIPv2 authentication?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
What are some of the key terms associated with the Diffusing Update Algorithm (DUAL)?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
In OSPF, the ____ database contains information about all OSPF peers with which a router has successfully exchanged Hello packets.

A) link-state
B) adjacencies
C) cost
D) topological
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match between columns
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
Bandwidth
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
RIPv1
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
Hello packets
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
MD5
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
EIGRP
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
Hash
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
Reliable multicast
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
Routing table updates
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
MTU
a feature of RTP that requests an acknowledgment via unicast to a multicast message
Bandwidth
a feature of RTP that requests an acknowledgment via unicast to a multicast message
RIPv1
a feature of RTP that requests an acknowledgment via unicast to a multicast message
Hello packets
a feature of RTP that requests an acknowledgment via unicast to a multicast message
MD5
a feature of RTP that requests an acknowledgment via unicast to a multicast message
EIGRP
a feature of RTP that requests an acknowledgment via unicast to a multicast message
Hash
a feature of RTP that requests an acknowledgment via unicast to a multicast message
Reliable multicast
a feature of RTP that requests an acknowledgment via unicast to a multicast message
Routing table updates
a feature of RTP that requests an acknowledgment via unicast to a multicast message
MTU
the speed of the link
Bandwidth
the speed of the link
RIPv1
the speed of the link
Hello packets
the speed of the link
MD5
the speed of the link
EIGRP
the speed of the link
Hash
the speed of the link
Reliable multicast
the speed of the link
Routing table updates
the speed of the link
MTU
an example of an EIGRP packet type that uses reliable multicast via RTP
Bandwidth
an example of an EIGRP packet type that uses reliable multicast via RTP
RIPv1
an example of an EIGRP packet type that uses reliable multicast via RTP
Hello packets
an example of an EIGRP packet type that uses reliable multicast via RTP
MD5
an example of an EIGRP packet type that uses reliable multicast via RTP
EIGRP
an example of an EIGRP packet type that uses reliable multicast via RTP
Hash
an example of an EIGRP packet type that uses reliable multicast via RTP
Reliable multicast
an example of an EIGRP packet type that uses reliable multicast via RTP
Routing table updates
an example of an EIGRP packet type that uses reliable multicast via RTP
MTU
a classful routing protocol
Bandwidth
a classful routing protocol
RIPv1
a classful routing protocol
Hello packets
a classful routing protocol
MD5
a classful routing protocol
EIGRP
a classful routing protocol
Hash
a classful routing protocol
Reliable multicast
a classful routing protocol
Routing table updates
a classful routing protocol
MTU
a number generated by MD5 from the secret key
Bandwidth
a number generated by MD5 from the secret key
RIPv1
a number generated by MD5 from the secret key
Hello packets
a number generated by MD5 from the secret key
MD5
a number generated by MD5 from the secret key
EIGRP
a number generated by MD5 from the secret key
Hash
a number generated by MD5 from the secret key
Reliable multicast
a number generated by MD5 from the secret key
Routing table updates
a number generated by MD5 from the secret key
MTU
a classless routing protocol
Bandwidth
a classless routing protocol
RIPv1
a classless routing protocol
Hello packets
a classless routing protocol
MD5
a classless routing protocol
EIGRP
a classless routing protocol
Hash
a classless routing protocol
Reliable multicast
a classless routing protocol
Routing table updates
a classless routing protocol
MTU
allow EIGRP neighbors to determine if routing peers are still online and available
Bandwidth
allow EIGRP neighbors to determine if routing peers are still online and available
RIPv1
allow EIGRP neighbors to determine if routing peers are still online and available
Hello packets
allow EIGRP neighbors to determine if routing peers are still online and available
MD5
allow EIGRP neighbors to determine if routing peers are still online and available
EIGRP
allow EIGRP neighbors to determine if routing peers are still online and available
Hash
allow EIGRP neighbors to determine if routing peers are still online and available
Reliable multicast
allow EIGRP neighbors to determine if routing peers are still online and available
Routing table updates
allow EIGRP neighbors to determine if routing peers are still online and available
MTU
the maximum datagram size allowed on a link
Bandwidth
the maximum datagram size allowed on a link
RIPv1
the maximum datagram size allowed on a link
Hello packets
the maximum datagram size allowed on a link
MD5
the maximum datagram size allowed on a link
EIGRP
the maximum datagram size allowed on a link
Hash
the maximum datagram size allowed on a link
Reliable multicast
the maximum datagram size allowed on a link
Routing table updates
the maximum datagram size allowed on a link
MTU
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Briefly describe OSPF authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.