If all devices on an EtherChannel are sending traffic to a single MAC address, which two methods of load balancing on the EtherChannel are preferred? (Choose two.)
If all devices on an EtherChannel are sending traffic to a single MAC address, which two methods of load balancing on the EtherChannel are preferred? (Choose two.)A . destination-MACB . src-dst-MACC . destination-IPD . source-MACE . source-IPView AnswerAnswer: BE
Which option is the cause of this issue?
A DHCP configured router is connected directly to a switch that has been provisioned with DHCP snooping. IP Source Guard with the ip verify source port-security command is configured under the interfaces that connect to all DHCP clients on the switch. However, clients are not receiving an IP address via...
Which three features can be optimized by using SDM templates?
Which three features can be optimized by using SDM templates?A . port securityB . trunkC . VLAND . accessE . DHCP snoopingF . routingView AnswerAnswer: CDF
What would happen if IEEE was VLAN 99 as native? (Choose two.)
What would happen if IEEE was VLAN 99 as native? (Choose two.)A . VLAN 1 tagged as 99B . VLAN 1 untagged as 99C . VLAN 99 tagged as 1D . VLAN 99 untagged as 1View AnswerAnswer: AB
VRRP authentication. (Choose three.)
VRRP authentication. (Choose three.)A . SHA-124B . SHA-254C . No authenticationD . WAPE . Plain text authenticationF . MD5View AnswerAnswer: CEF
Which feature is automatically enabled when a voice VLAN is configured, but not automatically disabled when a voice VLAN is removed?
Which feature is automatically enabled when a voice VLAN is configured, but not automatically disabled when a voice VLAN is removed?A . portfastB . port-securityC . spanning treeD . storm controlView AnswerAnswer: A Explanation: Voice VLAN Configuration Guidelines You should configure voice VLAN on switch access ports. The voice VLAN...
Which statement is true?
Refer to the exhibit. DSW1 should share the same MST region with switch DSW2. Which statement is true?A . Configure DSW1 with the same version number, and VLAN-to-instance mapping as shown on DSW2.B . DSW2 uses the VTP server mode to automatically propagate the MST configuration to DSW1.C . DSW1...
Which two statements apply to LLDP?
Which two statements apply to LLDP?A . It runs on the data link layerB . It runs on the network layerC . It is not enabled by default on Cisco devicesD . Enabled on Cisco devices by defaultView AnswerAnswer: AC
What effect does the mac address-table aging-time 180 command have on the MAC address- table?
What effect does the mac address-table aging-time 180 command have on the MAC address- table?A . This is how long a dynamic MAC address will remain in the CAM table.B . The MAC address-table will be flushed every 3 minutes.C . The default timeout period will be 360 seconds.D ....
Which statement about the UDLD protocol is true?
Which statement about the UDLD protocol is true?A . UDLD is a Cisco-proprietary Layer 2 protocol that enables devices to monitor the physical status of links and detect unidirectional failures.B . UDLD is a Cisco-proprietary Layer 2 protocol that enables devices to advertise their identity, capabilities, and neighbors on a...