1.
What is a characteristic of a static VLAN membership assignment?
2.
The commands below are configured on a Catalyst switch port. What will happen when the host with MAC
address 0001.0002.0003 attempts to connect? switchport port-security
switchport port-security maximum 3
switchport port-security mac-address 0002.0002.0002 switchport port-security violation shutdown
3.
Promiscuous ports must be ______________ to primary and secondary VLANs, and host ports must be ________________.
4.
Port security is being used to control access to a switch port. Which command will place the port into the errdisable state if an unauthorized station connects?
5.
Which command can implement a VLAN ACL called test?
6.
Which description is correct according to the output of the command show spanning-tree?
7.
Within the IEEE specification the Link Aggregation Control Protocol (LACP) provides a method to control the bundling of several physical ports together to form a single logical channel. As shown in the figure, Switch1 has been configured with LACP. Which command can be used to configure LACP on PG-SW2?
8.
According to the minimal VRRP configuration provided in the diagram, which command should be issued on PG-RTA to make sure that PG-RTA is the master virtual router?
 
9.
Which statement describes the function of a trust boundary? Select the best response.
10.
What is a critical piece of information that you should have when creating a VLAN-based implementation plan?