Net+ Quiz 2 Flashcards
Which of the following protocols support VLSM, summarization, and discontiguous networking? (Choose Three)
EIGRP, RIPv2, OSPF
Which of the following are considered distance vector routing protocols? (Choose Two)
RIPv2, RIP
Which of the following are considered link-state routing protocols? (Choose Two)
OSPF, IS-IS
Which of the following is considered a hybrid routing protocol?
EIGRP
Why would you want to use a dynamic routing protocol instead of using static routes?
dynamic routing scales to larger networks
Which of the following is a vendor-specific routing protocol?
EIGRP
RIP has a long convergence time and users have been complaining of response time when a router goes down and RIP has to re-converge. Which can you implement to improve convergence time in the network?
update RIP to OSPF using link-state
What is the administrative distance of OSPF?
110
Which of the following protocols will advertise routed IPv6 networks?
RIPng
What is the difference between static and dynamic routing?
dynamic routes are added automatically
Which routing protocol has a maximum hop count of 15?
RIPv1
Which of the following describes routing convergence time?
The time required by protocols to update their forwarding tables after changes have occurred.
What routing protocol is typically used to connect ASs on the Internet?
BGP
RIPv2 sends out its routing table every 30 seconds just like RIPv1, but it does so more efficiently. What type of transmission does RIPv2 use to accomplish this task?
multicasts
Which routing protocols have an administrative distance of 120? (Choose 2)
RIPv2, RIPv1
Which of the following routing protocols use AS-Path as one of the methods to build routing tables?
BGP
Which IPv6 routing protocol uses UDP port 521?
RIPng
What EIGRP information is held in RAM and maintained through the usage of hello and update packets? (Select all that apply)
neighbor table
Which is true regarding EIGRP successor routes?
A successor route is used by EIGRP to forward traffic to a destination.
Which of the following uses only hop count as a metric to find the best path to a remote network?
RIP
In general, firewalls work by ________________?
Allowing only packets that pass security restrictions to be forwarded.
What cannot be identified by the NESSUS program?
incorrect IP address
IDS systems can identify attackers by their ______________.
signature
Which device can limit traffic on a network and allow access onto specific TCP/IP port numbers when security is a concern?
firewall