You are on page 1of 1

Assignment 1

Date 7-02-19

Due date 14-02-19

1) In what ways are link-state protocols often considered to be superior to distance-


vector routing protocols? [3]

2) Routers within the networks of large organisations often learn about connectivity
using link-state protocols. Describe the general behaviour of distance vector
protocols. [6]

3) What are the different types of passwords used in securing a CISCO router? [5]

4) With the aid of diagrams differentiate between collision domain and broadcast
domain in as far as hubs, switches and routers are concerned. [6]

5) A spanning tree protocol is used to prevent layer 2 loops by blocking redundancy


links. Explain how Spanning Tree works use diagrams to illustrate your answer? 10]

6) What is Route Poisoning? [2]

7) What is a Mac Address Table and how a switch builds or populates a Mac Table?
[8]

You might also like