Which EtherChannel negotiation protocol is configured on the interface f0/13 f0/15?
Refer to the exhibit. Which EtherChannel negotiation protocol is configured on the interface f0/13 f0/15?A . Link Combination Control ProtocolB . Port Aggregation ProtocolC . Port Combination ProtocolD . Link Aggregation Control ProtocolView AnswerAnswer: B Explanation: PAgP modes are off, auto, desirable, and on. Only the combinations auto-desirable, desirable- desirable,...
There was another Exhibit about port priority- Core switch connected to 2 dis switches which connected 2 ASW. PC1 is connected to DSW1 and DSW2 (Root Bridge). Link connected from PC1 to DSW2 is 4Gbps and DSW1 is 10Gbps. There is etherchannel trunk between DSW1 and DSW2. Default port prioirty is configured. Change in port priority so traffic goes through DSW1 to DSW2
There was another Exhibit about port priority- Core switch connected to 2 dis switches which connected 2 ASW. PC1 is connected to DSW1 and DSW2 (Root Bridge). Link connected from PC1 to DSW2 is 4Gbps and DSW1 is 10Gbps. There is etherchannel trunk between DSW1 and DSW2. Default port prioirty...
Which two statements about extended-range VLANs are true? (Choose two.)
Which two statements about extended-range VLANs are true? (Choose two.)A . Created in VTP server mode in VTP version 3.B . Created when switch is in VTP server mode.C . They support pruning.D . VTP version 3 stores extended-range VLAN in VLAN database.E . VTP version 1 and 2 stores...
What is the result of the configuration?
Refer to the exhibit. What is the result of the configuration?A . The EtherChannels would not form because the load-balancing method must match on the devices.B . The EtherChannels would form and function properly even though the load-balancing and EtherChannel modes do not match.C . The EtherChannels would form, but...
What is the solution to avoid the snooping database from being rebuilt after every device reboot?
A Cisco Catalyst switch that is prone to reboots continues to rebuild the DHCP snooping database. What is the solution to avoid the snooping database from being rebuilt after every device reboot?A . A DHCP snooping database agent should be configured.B . Enable DHCP snooping for all VLANs that are...
What SPAN configuration is required to enable on a switch?
What SPAN configuration is required to enable on a switch?A . A monitor VLAN is created for the SPAN traffic.B . Configure a source and destination portC . Disable VTP pruning on trunk linksD . LLDP must be enable in an interface.View AnswerAnswer: B
Which three feature advantages are supported in VSS? (Choose three.)
Which three feature advantages are supported in VSS? (Choose three.)A . It supports single point of management, IP address and routing instance for virtual switchesB . It supports Multichassis EtherChannelC . It supports flexible deployment optionsD . It support Singlechassis EtherChannel.E . It supports multiple point of management, MAC address...
Which two statements about SDM templates are true?
Which two statements about SDM templates are true?A . They are used to allocate system resourcesB . Changing the SDM template will not disturb switch operation.C . You can verify the SDM template that is in use with the show sdm prefer commandView AnswerAnswer: AC
What is the reason for this?
An administrator recently configured all ports for rapid transition using PortFast. After testing, it has been determined that several ports are not transitioning as they should. What is the reason for this?A . RSTP has been enabled per interface and not globally.B . The STP root bridge selection is forcing...
Which of these options supports to maintain the network architechture and stability of the root bridge in a spanning-tree service?
Which of these options supports to maintain the network architechture and stability of the root bridge in a spanning-tree service?A . BPDU FilterB . BPDU GuardC . Root GuardD . Loop GuardView AnswerAnswer: C