Professional Documents
Culture Documents
Date 7-02-19
2) Routers within the networks of large organisations often learn about connectivity
using link-state protocols. Describe the general behaviour of distance vector
protocols. [6]
3) What are the different types of passwords used in securing a CISCO router? [5]
4) With the aid of diagrams differentiate between collision domain and broadcast
domain in as far as hubs, switches and routers are concerned. [6]
7) What is a Mac Address Table and how a switch builds or populates a Mac Table?
[8]