Each interface has a secure socket state which can be

  • No School
  • AA 1
  • 457

This preview shows page 234 - 237 out of 457 pages.

Each interface has a secure socket state, which can be one of the following: Cisco 400-101 Exam "Pass Any Exam. Any Time." - 234
Image of page 234
OSPFv3 will not send or accept packets while in the DOWN state. ReferenE. - 15-sy-book/ip6-route-ospfv3-auth-ipsec.html QUESTION NO: 284 Refer to the exhibit. The device with this configuration is unable to reach network The next hop router has been verified to have full connectivity to the network. Which two actions can you take to establish connectivity to the network? (Choose two.) A. Create a static route to using the address of the next hop router. B. Create a default route to the link address of the next hop router. C. Create a static route to the loopback address of the next hop router. D. Create a default route to E. Modify the existing static route so that the next hop is F. Replace the ip default-network command with the ip default-gateway command. Answer: A,B Explanation: Unlike the ip default-gateway command, you can use ip default-network when ip routing is enabled on the Cisco router. When you configure ip default-network the router considers routes to that network for installation as the gateway of last resort on the router. For every network configured with ip default-network, if a router has a route to that network, that route is flagged as a candidate default route. However, in this case if the router does not a route to the drfault network of, then you would need to ensure that this route exisits by creating a static route to using the address of the next hop router, or simply create a default route using the address of the next hop router. Cisco 400-101 Exam "Pass Any Exam. Any Time." - 235
Image of page 235
QUESTION NO: 285 Which algorithm heavily influenced the algorithm used by path-vector protocols? A. Bellman-Ford B. SPF C. DUAL D. Spanning-Tree E. Adaptive F. Deflection Answer: AExplanation: A path vector protocol is a computer network routing protocol which maintains the path informationthat gets updated dynamically. Updates which have looped through the network and returned tothe same node are easily detected and discarded. This algorithm is sometimes used inBellman–Ford routing algorithms to avoid "Count to Infinity" problems. ReferencE. QUESTION NO: 286 Refer to the exhibit. All of the routers on this network are running RIP. If you edit the R3 RIP process configuration to reduce the number of hops from R3 to R1, which statement about the configuration change is
Image of page 236
Image of page 237

You've reached the end of your free preview.

Want to read all 457 pages?

  • Fall '19

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask ( soon) You can ask (will expire )
Answers in as fast as 15 minutes
A+ icon
Ask Expert Tutors