The sh ip route command is entered on RouterB in the campus LAN shown in Figure 9-18. The LAN has been fully configured to run EIGRP. How many EIGRP subnets are running on the network? Identify the connected C and EIGRP D subnets.

Figure 9-18


7 subnets
See below:
RouterB#sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B -
BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate
default
U - per-user static route, o - ODR
T - traffic engineered route
Gateway of last resort is not set
10.0.0.0/24 is subnetted, 7 subnets
D 10.10.5.0 [90/2195456] via 10.10.150.2, 00:01:03, Ethernet3
C 10.10.10.0 is directly connected, Ethernet0
C 10.10.1.0 is directly connected, Ethernet1
D 10.10.20.0 [90/2195456] via 10.10.200.1, 00:01:02, Ethernet2
D 10.10.100.0 [90/2681856] via 10.10.200.1, 00:01:03, Ethernet2
[90/2681856] via 10.10.150.2, 00:01:03, Ethernet3
C 10.10.150.0 is directly connected, Ethernet3
C 10.10.200.0 is directly connected, Ethernet2

Computer Science & Information Technology

You might also like to view...

Once data items are stored using a database management system, applications may be written in ____________ to communicate with the DBMS.

a. Java b. C# c. Visual Basic d. any of these

Computer Science & Information Technology

List two reasons IPsec has become the standard set of protocols for VPN security.

What will be an ideal response?

Computer Science & Information Technology

To select the ROUND function, you click the ________ button in the Function Library group on the Formulas tab

A) Trig B) Statistics C) Math & Trig D) Math & Statistics

Computer Science & Information Technology

This function checks whether criteria are met and returns one value if TRUE and another value if

FALSE. A) TRUE B) IF C) BRANCH

Computer Science & Information Technology