A Layer 2 EtherChannel is formed. Where do you assign an IP address?
A Layer 2 EtherChannel is formed. Where do you assign an IP address?A . DHCPB . physical interfaceC . logical interfaceD . lowest physical interfaceView AnswerAnswer: C
Which two characteristics apply to Cisco Catalyst 6500 Series Switch supervisor redundancy using NSF? (Choose two.)
Which two characteristics apply to Cisco Catalyst 6500 Series Switch supervisor redundancy using NSF? (Choose two.)A . supported by RIPv2, OSPF, IS-IS, and EIGRPB . uses the FIB tableC . supports IPv4 and IPv6 multicastD . prevents route flappingView AnswerAnswer: BD
What is the value of the TPID/tag protocol identifier of QinQ?
What is the value of the TPID/tag protocol identifier of QinQ?A . 0x8a88B . 0x8100C . 0x8b45D . 0x8200View AnswerAnswer: A
Which option describes what this configuration allows?
A network engineer configures port security and 802.1x on the same interface. Which option describes what this configuration allows?A . It allows port security to secure the MAC address that 802.1x authenticates.B . It allows port security to secure the IP address that 802.1x authenticates.C . It allows 802.1x to...
Under which two circumstances does a stack master lose its role? (Choose two.)
Under which two circumstances does a stack master lose its role? (Choose two.)A . When the stack master is reseB . When the priority value of a stack member is changed to a higher value.C . When a switch with a higher priority is added to the stack.D . When...
What is the reason for this change?
After the recent upgrade of the switching infrastructure, the network engineer notices that the port roles that were once "blocking" are now defined as "alternate" and "backup." What is the reason for this change?A . The new switches are using RSTP instead of legacy IEEE 802.1D STC . IEEE 802.1D...
When IP Source Guard with source IP filtering is enabled on an interface, which feature must be enabled on the access VLAN for that interface?
When IP Source Guard with source IP filtering is enabled on an interface, which feature must be enabled on the access VLAN for that interface?A . DHCP snoopingB . storm controlC . spanning-tree portfastD . private VLANView AnswerAnswer: A Explanation: IP Source Guard Configuration Guidelines You can configure static IP...
Which version of spanning tree is appropriate to meet the company policy?
To follow the Layer 2 switching guidelines, a network engineer decides to create a separate spanning tree for every group of 10 VLANs. Which version of spanning tree is appropriate to meet the company policy?A . MSTB . PVST+C . RSTPD . RPVST+E . STPView AnswerAnswer: A
Which two limitations of LOCAL SPAN are true? (Choose Two)
Which two limitations of LOCAL SPAN are true? (Choose Two)A . The source and destination ports must reside in the same switch or switch stackB . It can monitor only traffic that ingresses or egresses on the source interface or VLANC . A SPAN session can support multiple destination ports...
Which two statements about RSPAN VLAN are true? (Choose two.)
Which two statements about RSPAN VLAN are true? (Choose two.)A . RSPAN VLAN must be configured in VLAN configuration mode using the remote-span command.B . RSPAN VLAN trunks can handle Spanning-Tree protocol, except for SPAN destination ports.C . RSPAN VLAN access ports can handle Spanning-Tree protocol in conjunction with SPAN...