EXAM COMPLETE ACCURATE EXAM
QUESTIONS WITH DETAILED
VERIFIED ANSWERS (100% CORRECT
ANSWERS) /ALREADY GRADED A+
What's the technique used to send IPv6 over IPv4? -
....ANSWER...Encapsulation: Taking data, putting it
inside another packet for a specific protocol (IPv4
(IPv6))
Tunneling: Sending encapsulated packets to pass
seamlessly through a network
What information is stored inside an ARP table in a
router? - ....ANSWER...Address resolution protocol
MAC address, IP address, and Time to Live. The
switch learns from the broadcast and the messages
sent and builds its own ARP table
What is the purpose and the process behind binary
exponential backoff? - ....ANSWER...To prevent the
, collision of packets when they're entering a network
simultaneously. Creates a subset of time that it will
attempt to retry. Rather than just continuing, wait 1,3
or 5 seconds. Pick a random number from the
subset. If you wait for that long and still and can't get
through you make a bigger subset and try for the
longer time.
Properties of Link State algorithms -
....ANSWER...Network topology must be known by
each host
Link state algorithms require that you search
through the entire network to find the shortest path
distance between hosts (like having a map)
Examples of link state algorithms are Dijkstra's algo
Dijkstra's has static scaling (O(n^2) time complexity)
Properties of Distance Vector algorithms -
....ANSWER...Topology does not have to be known by
every host
Host doesn't need to know whole algorithm
Algorithm scales dynamically instead of statically
Instead of iterating, you're just visiting neighbors