Which of the following commands is used to configure RIPv2 and not RIP?

a. router rip
b. router ripv2
c. version 2
d. no version 1


c. version 2
Explanation: The command router rip is used to configure both versions of RIP but version 2 is used to change the configuration. Version 2 command is entered after router rip (config-router) prompt and must be enabled on all RIP routers in the domain.

Computer Science & Information Technology

You might also like to view...

When you first sign up for Pinterest, you're prompted to create ________ boards from a list of suggested categories

A) three B) five C) seven D) ten

Computer Science & Information Technology

Emphasis in Sway is similar to ________ in Word

A) bold B) shadow C) italics D) underline

Computer Science & Information Technology

?Identify the letters of the choices that best match the phrases or definitions.

A. ?Uses a single key to encrypt and decrypt information B. ?An asymmetric kind of encryption C. ?Combination of hardware and software that allows computers to interact with a network D. ?Might include company hardware, software, data, networks, people, or procedures E. ?A risk control strategy that reduces the impact of a risk by careful planning and preparation F. ?A risk control strategy that shifts risks to another asset or party G. ?Hostile act that targets systems or a company itself H. ?Protects the system and keeps it safe, free from danger, and reliable I. ?Records everything that is typed into the keyboard, including passwords, while the system continues to function normally J. ?Uses analytical techniques to identify potential quality and performance improvements in an information system

Computer Science & Information Technology

_______________ values are like binary values but are limited to exactly 64 bits.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology