What logical operation is performed to calculate EtherChannel load balancing as a function of two addresses?

 
 
 
 

If Fast Ethernet ports are bundled into an EtherChannel, what is the maximum throughput supported on a Catalyst switch?

 
 
 
 
 

Which one of the following is a valid combination of ports for an EtherChannel?

 
 
 
 

When port-based authentication is enabled globally, what is the default behavior for all switch ports?

 
 
 
 

When does an RSTP switch consider a neighbor to be down?

 
 
 
 

Which process is used during RSTP convergence?

 
 
 
 

Which of the following is not a valid method for EtherChannel load balancing?

 
 
 
 

On which standard is RSTP based?

 
 
 
 

What type of interface represents an EtherChannel as a whole?

 
 
 
 

Which of the following arrangements can be considered interVLAN routing?

 
 
 
 

Which of these methods distributes traffic over an EtherChannel?

 
 
 
 

What is the purpose of breaking a campus network into a hierarchical design?

 
 
 
 

Which one of the following commands enables the use of RSTP?

 
 
 
 
 

Which of the following is not a port state in RSTP?

 
 
 
 

How many distribution switches should be built into each switch block?

 
 
 
 

What are the most important aspects to consider when designing the core layer in a large network? (Choose all that apply.)

 
 
 
 
 

Which of the following is not a characteristic of MST?

 
 
 
 

Which of these is a method for negotiating an EtherChannel?
a. PAP
b. CHAP
c. LAPD
d. LACP

 
 
 
 

In what part of a Catalyst switch are VLAN ACLs implemented?

 
 
 
 

When a switch running RSTP receives an 802.1D BPDU, what happens?

 
 
 
 

How can the EtherChannel load-balancing method be set?

 
 
 
 

Assume that CEF is active on a switch. What happens to a packet that arrives needing fragmentation?

 
 
 
 

Which of the following is a valid EtherChannel negotiation mode combination between two switches?

 
 
 
 

Which of the following standards defines the MST protocol?

 
 
 
 

In a switch spoofing attack, an attacker makes use of which one of the following?

 
 
 
 

What is the maximum number of access-layer switches that can connect into a single distribution-layer switch?
a. 1
b. 2
c. Limited only by the number of ports on the access-layer switch-
d. Limited only by the number of ports on the distribution-layer switch
e. Unlimited

 
 
 
 
 

Which one of the following types of traffic is sent securely over an LWAPP tunnel?

 
 
 
 

Which DSCP codepoint name usually is used for time-critical packets containing voice data?

 
 
 
 

What causes RSTP to view a port as a point-to-point port?

 
 
 
 

Which of the following events triggers a topology change with RSTP on a nonedge port?

 
 
 
 


Share this: