What logical operation is performed to calculate EtherChannel load balancing as a function of two addresses?


If Fast Ethernet ports are bundled into an EtherChannel, what is the maximum throughput supported on a Catalyst switch?


Which one of the following is a valid combination of ports for an EtherChannel?


When port-based authentication is enabled globally, what is the default behavior for all switch ports?


When does an RSTP switch consider a neighbor to be down?


Which process is used during RSTP convergence?


Which of the following is not a valid method for EtherChannel load balancing?


On which standard is RSTP based?


What type of interface represents an EtherChannel as a whole?


Which of the following arrangements can be considered interVLAN routing?


Which of these methods distributes traffic over an EtherChannel?


What is the purpose of breaking a campus network into a hierarchical design?


Which one of the following commands enables the use of RSTP?


Which of the following is not a port state in RSTP?


How many distribution switches should be built into each switch block?


What are the most important aspects to consider when designing the core layer in a large network? (Choose all that apply.)


Which of the following is not a characteristic of MST?


Which of these is a method for negotiating an EtherChannel?
a. PAP


In what part of a Catalyst switch are VLAN ACLs implemented?


When a switch running RSTP receives an 802.1D BPDU, what happens?


How can the EtherChannel load-balancing method be set?


Assume that CEF is active on a switch. What happens to a packet that arrives needing fragmentation?


Which of the following is a valid EtherChannel negotiation mode combination between two switches?


Which of the following standards defines the MST protocol?


In a switch spoofing attack, an attacker makes use of which one of the following?


What is the maximum number of access-layer switches that can connect into a single distribution-layer switch?
a. 1
b. 2
c. Limited only by the number of ports on the access-layer switch-
d. Limited only by the number of ports on the distribution-layer switch
e. Unlimited


Which one of the following types of traffic is sent securely over an LWAPP tunnel?


Which DSCP codepoint name usually is used for time-critical packets containing voice data?


What causes RSTP to view a port as a point-to-point port?


Which of the following events triggers a topology change with RSTP on a nonedge port?


Share this: