1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liberstina [14]
3 years ago
8

Which routing protocol does an exterior router use to collect data to build its routing tables?

Computers and Technology
1 answer:
natita [175]3 years ago
3 0

Answer:

D. BGP

Explanation:

In order to exchange routing information with another AS (Autonomous Systems) only, exterior routers use an exterior routing protocol, like BGP (Border Gateway Protocol) or EGP (Exterior Routing Protocol).

BGP is an application-layer protocol in the TCP/IP suite, that uses a well-known TCP port (179) in order to deliver information reliably.

It is important to note that in order to exchange routing data within his own AS, the router uses an interior routing protocol, like OSPF.

You might be interested in
What type of firewall works on the Session layer that creates a connection and allows packets to flow between the two hosts with
valkas [14]

Answer:

The correct answer is "circuit-level gateway"

Explanation:

A circuit-level gateway is a type of firewall that works at the session layer between the transport and application layer.

8 0
3 years ago
Did this technological advancement take away or create jobs? Overall, what was the contribution of this technological advancemen
mars1129 [50]
It took away jobs and made day to day tasks easier
3 0
3 years ago
When conducting research on the internet, what is a starting point for determining how to start the research?
Alex787 [66]
It depends on what you're researching for.
4 0
3 years ago
In case of a suspected data breach, what course of action should a chief information security officer (CISO) take
guapka [62]

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

7 0
3 years ago
Units of distance on a computer’s screen are measured in microns.
Trava [24]

Answer:

true

Explanation:

why xzuse

5 0
3 years ago
Other questions:
  • Calculate the total number of bits transferred if 200 pages of ASCII data are sent using asynchronous serial data transfer. Assu
    5·1 answer
  • In an inheritance situation, the new class that you create from an existing class is known as the:
    5·1 answer
  • What kind of game was pole position?
    6·2 answers
  • Write the definition of a class clock. the class has no constructors and three instance variables. one is of type int called hou
    12·1 answer
  • A(n) ____ is a service from local telephone companies in which up-to-date telephone facilities at the telephone company s centra
    9·1 answer
  • Complete the sentence.
    5·1 answer
  • By convention only, either the first usable address or the last usable address in a network is assigned to the router (gateway)
    11·1 answer
  • Explain how AI smartphone software in the rental car can be a threat to privacy.
    14·1 answer
  • MODERATOR DELETE MY ACC
    8·2 answers
  • Digital communication and production chapter 17
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!