Which of the following routing protocol uses a state algorithm?

A. BGP
B. RIP
C. OSPF
D. RIPv2

Answer: C. OSPF

Computer Science & Information Technology

You might also like to view...

Virtual machine ________ are used to capture the state, data, and configuration of a VM

Fill in the blank(s) with correct word

Computer Science & Information Technology

Understanding confidentiality and integrity models and defense in depth are covered in which of the following CBK domains?

A. Cryptography B. Telecommunications and network security C. Operations security D. Security architecture and design

Computer Science & Information Technology