If all devices on an EtherChannel are sending traffic to a single MAC address, which two methods of load balancing on the EtherChannel are preferred? (Choose two.)

If all devices on an EtherChannel are sending traffic to a single MAC address, which two methods of load balancing on the EtherChannel are preferred? (Choose two.)A . destination-MACB . src-dst-MACC . destination-IPD . source-MACE . source-IPView AnswerAnswer: BE

March 20, 2018 No Comments READ MORE +

Which option is the cause of this issue?

A DHCP configured router is connected directly to a switch that has been provisioned with DHCP snooping. IP Source Guard with the ip verify source port-security command is configured under the interfaces that connect to all DHCP clients on the switch. However, clients are not receiving an IP address via...

March 19, 2018 No Comments READ MORE +

Which three features can be optimized by using SDM templates?

Which three features can be optimized by using SDM templates?A . port securityB . trunkC . VLAND . accessE . DHCP snoopingF . routingView AnswerAnswer: CDF

March 18, 2018 No Comments READ MORE +

What would happen if IEEE was VLAN 99 as native? (Choose two.)

What would happen if IEEE was VLAN 99 as native? (Choose two.)A . VLAN 1 tagged as 99B . VLAN 1 untagged as 99C . VLAN 99 tagged as 1D . VLAN 99 untagged as 1View AnswerAnswer: AB

March 18, 2018 No Comments READ MORE +

VRRP authentication. (Choose three.)

VRRP authentication. (Choose three.)A . SHA-124B . SHA-254C . No authenticationD . WAPE . Plain text authenticationF . MD5View AnswerAnswer: CEF

March 18, 2018 No Comments READ MORE +

Which feature is automatically enabled when a voice VLAN is configured, but not automatically disabled when a voice VLAN is removed?

Which feature is automatically enabled when a voice VLAN is configured, but not automatically disabled when a voice VLAN is removed?A . portfastB . port-securityC . spanning treeD . storm controlView AnswerAnswer: A Explanation: Voice VLAN Configuration Guidelines You should configure voice VLAN on switch access ports. The voice VLAN...

March 17, 2018 No Comments READ MORE +

Which statement is true?

Refer to the exhibit. DSW1 should share the same MST region with switch DSW2. Which statement is true?A . Configure DSW1 with the same version number, and VLAN-to-instance mapping as shown on DSW2.B . DSW2 uses the VTP server mode to automatically propagate the MST configuration to DSW1.C . DSW1...

March 17, 2018 No Comments READ MORE +

Which two statements apply to LLDP?

Which two statements apply to LLDP?A . It runs on the data link layerB . It runs on the network layerC . It is not enabled by default on Cisco devicesD . Enabled on Cisco devices by defaultView AnswerAnswer: AC

March 17, 2018 No Comments READ MORE +

What effect does the mac address-table aging-time 180 command have on the MAC address- table?

What effect does the mac address-table aging-time 180 command have on the MAC address- table?A . This is how long a dynamic MAC address will remain in the CAM table.B . The MAC address-table will be flushed every 3 minutes.C . The default timeout period will be 360 seconds.D ....

March 16, 2018 No Comments READ MORE +

Which statement about the UDLD protocol is true?

Which statement about the UDLD protocol is true?A . UDLD is a Cisco-proprietary Layer 2 protocol that enables devices to monitor the physical status of links and detect unidirectional failures.B . UDLD is a Cisco-proprietary Layer 2 protocol that enables devices to advertise their identity, capabilities, and neighbors on a...

March 16, 2018 No Comments READ MORE +