From: anthony.sequeira@thomson.com
Date: Fri Feb 09 2007 - 14:06:21 ART
LAST WEEK'S ANSWER:
4-11-5. Examine the topology shown in Exhibit 1. Router A has lost
information for the 10.10.0.0 network. Router A possesses no feasible
successor route for the lost network. How will EIGRP react if all
routers are in the default EIGRP configuration?
a. Router A will not send a query as the network is directly
connected
b. Router A will query Router B, if Router B has no information
about the route, the query stops
c. Router A will query Router B, if Router B has no information
about the route, Router B queries Router C and Router D
d. None of these options are correct
Exhibit 1
Answer: c
Topic Domain: 4c
Issues:
How does the query process function in EIGRP?
Solutions:
If a router does not possess a feasible successor for the route
information that is lost, it will query its neighbors for the
information. If these neighbors do not possess information on the route,
they will in turn query their neighbors. This can present issues with
EIGRP. Cisco states that as a result - the protocol is not "plug and
play" for large networks. Query scoping is a configuration that needs to
be considered.
More Information:
Troubleshooting EIGRP Neighbor Relationships
http://www.ciscopress.com/articles/article.asp?p=27839&rl=1
LAST WEEK'S QUESTION:
4-11-5. Examine the topology shown in Exhibit 1. Router A has lost
information for the 10.10.0.0 network. Router A possesses no feasible
successor route for the lost network. How will EIGRP react if all
routers are in the default EIGRP configuration?
a. Router A will not send a query as the network is directly
connected
b. Router A will query Router B, if Router B has no information
about the route, the query stops
c. Router A will query Router B, if Router B has no information
about the route, Router B queries Router C and Router D
d. None of these options are correct
Exhibit 1
10.10.1.1/16---RouterA---WAN Adjacency with RouterB----WAN Adjacency
with RouterC and RouterD
THIS WEEK'S QUESTION:
3-11-1. Examine the router configurations displayed in Exhibit 1. Which
statements regarding these configurations are correct? Choose all that
apply.
a. Authentication is not configured properly as the ntp trusted-key
command is missing from R1
b. R1 can synchronize R2, and R2 can synchronize R1
c. R2 will feature a stratum value of 2
d. With NTP, the client initiates authentication
Exhibit 1
R1
clock set 13:00:00 15 Nov 2020
ntp master 1
ntp authentication-key 1 md5 MYSECRETKEY
R2
clock set 13:00:00 15 Nov 2020
ntp authenticate
ntp authentication-key 1 md5 MYSECRETKEY
ntp trusted-key 1
ntp server 10.10.10.1 key 1
Question of the Week Compliments of:
TESTiT
http://www.netmasterclass.com/site/written.php
This archive was generated by hypermail 2.1.4 : Thu Mar 01 2007 - 07:38:46 ART