EFAiShares MSCI EAFE ETF
EFA Fund Description
EFA tracks a market-cap-weighted index of developed-market securities based in Europe, Australia and the Far East. It excludes the US and Canada, and small-caps.
EFA Factset Analytics Insight
EFA provides highly accessible exposure to probably the best-known international equity index: MSCI’s EAFE. The fund delivers excellent exposure to developed equities, albeit with some definitional differences from peers. It excludes North America and South Korea, while Vanguard’s VEA includes South Korea and Schwab’s SCHF includes both countries. EFA holds only large- and midcap stocks, sister fund IEFA offers similar geographic exposure while including small-caps in marketlike proportion. Launched in 2001, the fund was first in the space. Investors should consider all in costs when comparing the fund to other ETFs in the space. As EFA tends to claw back much of its fee through skillful portfolio management and securities lending revenue sharing. In all, EFA delivers excellent coverage of international equities.
EFA Summary Data
EFA Portfolio Data
EFA Index Data
EFA Portfolio Management
EFA Tax Exposures
EFA Fund Structure
EFA Factset Analytics Block Liquidity
This measurement shows how easy it is to trade a $1 million USD block of EFA. EFA is rated a 5 out of 5.
EFA Sector/Industry Breakdown
EFA Top 10 Holdings[View All]
EFA Economic Development
EFA Performance Statistics
EFA Benchmark Comparison Summary
EFA Benchmark Comparison Market Cap Size
Options Strategies for Outcome Investing
Options allow you to customize investment outcomes. Using the strategy builders provided by Cboe Vest Technologies, you can construct some of the most common option strategies. Check out our user guide for more information on how to use the tool.
A collar strategy is a protective option strategy constructed by writing a call and buying a put with the same expiration date while being long the underlying security.
A covered call is an income strategy constructed by writing a call option against a holding of the underlying security.