400-101 Guide

400-101 Exam Royal Pack (In Stock.)

 
  • Cisco
  • Exam Number/Code 400-101
  • Product Name CCIE Routing and Switching (v5.0)
  • Questions and Answers
  • 911 Q&As
  • Last Updated
  • Jun 18,2018
  • List Price
  • $128.99
  • Price
  • Today 49.99 USD

Free TrialVersion: demo Buy Now 50% OFF

Beginners Guide: 400 101 pdf

Our pass rate is high to 98.9% and the similarity percentage between our ccie 400 101 study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Cisco cisco 400 101 exam in just one try? I am currently studying for the Cisco 400 101 vce exam. Latest Cisco 400 101 dumps Test exam practice questions and answers, Try Cisco 400 101 ccie Brain Dumps First.

Q461. Refer to the exhibit. 

Which VLANs are permitted to send frames out port FastEthernet0/1? 

A. 100 - 200 

B. 4 - 100 

C. 1 and 4 - 100 

D. 3 and 4 - 100 

Answer:

Explanation: 

Traffic on the native vlan does not get tagged as it crosses a trunk, so there is no dot1q tag in the first place to be filtered. And you don’t need to allow the native vlan. But if we force to tag the native vlan (with the “switchport trunk native vlan tag” command) then if the native vlan is not in the “allowed vlan” list it will be dropped. 


Q462. When BGP route reflectors are used, which attribute ensures that a routing loop is not created? 

A. weight 

B. local preference 

C. multiexit discriminator 

D. originator ID 

Answer:

Explanation: 

As the iBGP learned routes are reflected, routing information may loop. The route reflector model has the following mechanisms to avoid routing loops: 

. Originator ID is an optional, nontransitive BGP attribute. It is a 4-byte attributed created by a route reflector. The attribute carries the router ID of the originator of the route in the local autonomous system. Therefore, if a misconfiguration causes routing information to come back to the originator, the information is ignored. 

. Cluster-list is an optional, nontransitive BGP attribute. It is a sequence of cluster IDs that the route has passed. When a route reflector reflects a route from its clients to nonclient peers, and vice versa, it appends the local cluster ID to the cluster-list. If the cluster-list is empty, a new cluster-list is created. Using this attribute, a route reflector can identify if routing information is looped back to the same cluster due to misconfiguration. If the local cluster ID is found in the cluster-list, the advertisement is ignored. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/ip/configuration/guide/fipr_c/1cfbgp.html 


Q463. Refer to the exhibit. 

Which statement is true about a valid IPv6 address that can be configured on tunnel interface0? 

A. There is not enough information to calculate the IPv6 address. 

B. 6to4 tunneling allows you to use any IPv6 address. 

C. 2001:7DCB:5901::/128 is a valid IPv6 address. 

D. 2002:7DCB:5901::/128 is a valid IPv6 address. 

Answer:

Explanation: 

Most IPv6 networks use autoconfiguration, which requires the last 64 bits for the host. The first 64 bits are the IPv6 prefix. The first 16 bits of the prefix are always 2002:, the next 32 bits are the IPv4 address, and the last 16 bits of the prefix are available for addressing multiple IPv6 subnets behind the same 6to4 router. Since the IPv6 hosts using autoconfiguration already have determined the unique 64 bit host portion of their address, they must simply wait for a Router Advertisement indicating the first 64 bits of prefix to have a complete IPv6 address. A 6to4 router will know to send an encapsulated packet directly over IPv4 if the first 16 bits are 2002, using the next 32 as the destination, or otherwise send the packet to a well-known relay server, which has access to native IPv6. 

Reference: http://en.wikipedia.org/wiki/6to4 


Q464. Which regular expression will only allow prefixes that originated from AS 65000 and that are learned through AS 65001? 

A. ^65000_65001$ 

B. 65000_65001$ 

C. ^65000_65001 

D. ^65001_65000$ 

Answer:

Explanation: 

The following table lists the regular expressions and their meanings: 

+------------------------------------------------------+ 

| CHAR | USAGE | 

+------------------------------------------------------| 

| ^ | Start of string | 

|------|-----------------------------------------------| 

| $ | End of string | 

|------|-----------------------------------------------| 

| [] | Range of characters | 

|------|-----------------------------------------------| 

| - | Used to specify range ( i.e. [0-9] ) | 

|------|-----------------------------------------------| 

| ( ) | Logical grouping | 

|------|-----------------------------------------------| 

| . | Any single character | 

|------|-----------------------------------------------| 

| * | Zero or more instances | 

|------|-----------------------------------------------| 

| + | One or more instance | 

|------|-----------------------------------------------| 

| ? | Zero or one instance | 

|------|-----------------------------------------------| 

| _ | Comma, open or close brace, open or close | 

| | parentheses, start or end of string, or space | 

+------------------------------------------------------+ 

Some commonly used regular expressions include: 

+-------------+---------------------------+ 

| Expression | Meaning | 

|-------------+---------------------------| 

| .* | Anything | 

|-------------+---------------------------| 

| ^$ | Locally originated routes | 

|-------------+---------------------------| 

| ^100_ | Learned from AS 100 | 

|-------------+---------------------------| 

| _100$ | Originated in AS 100 | 

|-------------+---------------------------| 

| _100_ | Any instance of AS 100 | 

|-------------+---------------------------| 

| ^[0-9]+$ | Directly connected ASes | 

+-------------+---------------------------+ 

Reference: http://blog.ine.com/2008/01/06/understanding-bgp-regular-expressions/ 


Q465. Which IP SLA operation type is enhanced by the use of the IP SLAs Responder? 

A. DNS 

B. HTTP 

C. ICMP Echo 

D. UDP Echo 

Answer:

Explanation: 

Figure 1. UDP Echo Operation 

Response time (round-trip time) is computed by measuring the time taken between sending a UDP echo request message from Device B to the destination device--Device A--and receiving a UDP echo reply from Device A. UDP echo accuracy is enhanced by using the IP SLAs Responder at Device A, the destination Cisco device. If the destination device is a Cisco device, then IP SLAs sends a UDP datagram to any port number that you specified. Using the IP SLAs Responder is optional for a UDP echo operation when using Cisco devices. The IP SLAs Responder cannot be configured on non-Cisco devices. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipsla/configuration/15-mt/sla-15-mt-book/sla_udp_echo.html 


Q466. Which three characteristics are shared by subinterfaces and associated EVNs? (Choose three.) 

A. IP address 

B. routing table 

C. forwarding table 

D. access control lists 

E. NetFlow configuration 

Answer: A,B,C 


Q467. Refer to the exhibit. 

R2 is configured as the R1 neighbor in area 51, but R2 fails to receive the configured summary route. Which action can you take to correct the problem? 

A. Replace the summary-address command with the area-range command. 

B. Configure a summary address under R1interface GigabitEthernet0/0. 

C. Configure a summary address under R1 interface GigabitEthernet1/0. 

D. Configure the no discard-route command in the OSPF process of R1. 

E. Configure ip ospf network broadcast under the Loopback0 interface of R1. 

Answer:


Q468. Refer to the exhibit. 

What does "(received-only)" mean? 

A. The prefix 10.1.1.1 can not be advertised to any eBGP neighbor. 

B. The prefix 10.1.1.1 can not be advertised to any iBGP neighbor. 

C. BGP soft reconfiguration outbound is applied. 

D. BGP soft reconfiguration inbound is applied. 

Answer:

Explanation: 

When you configure bgp soft-configuration-inbound, all the updates received from the neighbor will be stored unmodified, regardless of the inbound policy, and these routes appear as “(received-only).” 


Q469. Which statement about SSHv2 is true? 

A. Routers acting as SSH clients can operate without RSA keys. 

B. SSHv2 supports port forwarding and compression. 

C. The RSA key pair size must be at least 512. 

D. You must configure a default gateway before you enable SSHv2. 

Answer:


Q470. What can PfR passive monitoring mode measure for TCP flows? 

A. only delay 

B. delay and packet loss 

C. delay and reachability 

D. delay, packet loss, and throughput 

E. delay, packet loss, throughput, and reachability 

Answer:

Explanation: 

Passive monitoring metrics include the following: 

. Delay: Cisco PfR measures the average delay of TCP flows for a given prefix or traffic class. Delay is the measurement of the round-trip response time (RTT) between the transmission of a TCP synchronization message and receipt of the TCP acknowledgement. 

. Packet loss: Cisco PfR measures packet loss by tracking TCP sequence numbers for each TCP flow; it tracks the highest TCP sequence number. If it receives a subsequent packet with a lower sequence number, PfR increments the packet-loss counter. Packet 

loss is measured in packets per million. 

. Reachability: Cisco PfR measures reachability by tracking TCP synchronization messages that have been sent repeatedly without receiving a TCP acknowledgement. 

. Throughput: Cisco PfR measures TCP throughput by measuring the total number of bytes and packets for each interesting traffic class or prefix for a given interval of time. 

Reference: http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/performance-routing-pfr/product_data_sheet0900aecd806c4ee4.html 


To know more about the 400-101, click here.

Tagged as : Cisco 400-101 Dumps, Download 400-101 pdf, 400-101 VCE, 400-101 pass4sure, examcollection 400-101