What two entries are needed in the forwarding table of a typical host?
What will be an ideal response?
A typical host forwarding table has the entries for the network(s) that can be reached and the
mask being used.
You might also like to view...
For a vector, inserting or deleting invalidates iterators in positions after the insertion or deletion. What happens to the set container if we delete in the middle?
What will be an ideal response?
Bottom-up design is a systematic approach in which a problem is broken into a series of high-level tasks
Indicate whether the statement is true or false
What User Datagram Protocol (UDP) ports does SNMP use for secure communication?
A. 61 and 62 B. 610 and 612 C. 161 and 162 D. 10162 and 10161
How many loops are necessary to access the contents of a one-dimensional array efficiently?
A. 0 B. 1 C. 2 D. more than 2