Which of the following routing protocol uses a state algorithm?
A. BGP
B. RIP
C. OSPF
D. RIPv2
Answer: C. OSPF
Computer Science & Information Technology
You might also like to view...
Virtual machine ________ are used to capture the state, data, and configuration of a VM
Fill in the blank(s) with correct word
Computer Science & Information Technology
Understanding confidentiality and integrity models and defense in depth are covered in which of the following CBK domains?
A. Cryptography B. Telecommunications and network security C. Operations security D. Security architecture and design
Computer Science & Information Technology