400-101 Guide

400-101 Exam Royal Pack (In Stock.)

  • Cisco
  • Exam Number/Code 400-101
  • Product Name CCIE Routing and Switching (v5.0)
  • Questions and Answers
  • 911 Q&As
  • Last Updated
  • Jun 18,2018
  • List Price
  • $128.99
  • Price
  • Today 49.99 USD

Free TrialVersion: demo Buy Now 50% OFF

Ideas to exam 400 101

Want to know Ucertify 400 101 ccie Exam practice test features? Want to lear more about Cisco CCIE Routing and Switching (v5.0) certification experience? Study Printable Cisco cisco 400 101 answers to Up to date cisco 400 101 questions at Ucertify. Gat a success with an absolute guarantee to pass Cisco exam 400 101 (CCIE Routing and Switching (v5.0)) test on your first attempt.

Q471. What is the goal of Unicast Reverse Path Forwarding? 

A. to verify the reachability of the destination address in forwarded packets 

B. to help control network congestion 

C. to verify the reachability of the destination address in multicast packets 

D. to verify the reachability of the source address in forwarded packets 



Network administrators can use Unicast Reverse Path Forwarding (Unicast RPF) to help limit the malicious traffic on an enterprise network. This security feature works by enabling a router to verify the reachability of the source address in packets being forwarded. This capability can limit the appearance of spoofed addresses on a network. If the source IP address is not valid, the packet is discarded. 

Reference: http://www.cisco.com/web/about/security/intelligence/unicast-rpf.html 

Q472. Refer to the exhibit. 

What does the return code 3 represent in this output? 

A. The mapping of the replying router for the FEC is different. 

B. The packet is label-switched at stack depth. 

C. The return code is reserved. 

D. The upstream index is unknown. 

E. The replying router was the proper egress for the FEC. 



Return Codes The Return Code is set to zero by the sender. The receiver can set it to one of the values listed below. The notation <RSC> refers to the Return Subcode. This field is filled in with the stack-depth for those codes that specify that. For all other codes, the Return Subcode MUST be set to zero. 

Value Meaning 

0 No return code 

1 Malformed echo request received 

2 One or more of the TLVs was not understood 

3 Replying router is an egress for the FEC at stack-depth <RSC> 

4 Replying router has no mapping for the FEC at stack-depth <RSC> 

Reference: https://www.ietf.org/rfc/rfc4379.txt 

Q473. Which circumstance can cause packet loss due to a microburst? 

A. slow convergence 

B. a blocked spanning-tree port 

C. process switching 

D. insufficient buffers 



Micro-bursting is a phenomenon where rapid bursts of data packets are sent in quick succession, leading to periods of full line-rate transmission that can overflow packet buffers of the network stack, both in network endpoints and routers and switches inside the network. 

Symptoms of micro bursts will manifest in the form of ignores and/ or overruns (also shown as accumulated in “input error” counter within show interface output). This is indicative of receive ring and corresponding packet buffer being overwhelmed due to data bursts coming in over extremely short period of time (microseconds). 

Reference: http://ccieordie.com/?tag=micro-burst 

Q474. Which statement about traffic management when PIM snooping is enabled is true? 

A. Traffic is restricted to host ports. 

B. All multicast traffic is flooded to the designated router. 

C. Join message are flooded to all routers. 

D. Designated routers receive traffic only from groups through which a join message is received. 



Drag and drop the EIGRP query condition on the left to the corresponding action taken by the router on the right. 



Drag each MPLS term on the left to the matching statement on the right. 


Q477. Which two options are differences between TACACS+ and RADIUS using AAA? (Choose two.) 

A. Only TACACS+ limits the protocols that are supported. 

B. Only RADIUS combines accounting and authentication. 

C. Only TACACS+ uses TCP. 

D. Only RADIUS combines authorization and accounting. 

E. Only RADIUS encrypts the password in packets from the client to the server. But leaves the body of the message unencrypted. 

Answer: C,E 

Q478. Which two options are mandatory components of a multiprotocol BGP VPN-IPv4 address? (Choose two.) 

A. a route distinguisher 

B. an IPv4 address 

C. a route target 

D. an MPLS label 

E. a system ID 

F. an area ID 

Answer: A,B 


The IP prefix is a member of the IPv4 address family. After the PE device learns the IP prefix, the PE converts it into a VPN-IPv4 prefix by combining it with an 8-byte route distinguisher (RD). The generated prefix is a member of the VPN-IPv4 address family. It uniquely identifies the customer address, even if the customer site is using globally nonunique (unregistered private) IP addresses. The route distinguisher used to generate the VPN-IPv4 prefix is specified by a configuration command associated with the virtual routing and forwarding (VRF) instance on the PE device. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/mp_l3_vpns/configuration/15-mt/mp-l3-vpns-15-mt-book/mp-bgp-mpls-vpn.html 

Q479. Which three options are results of the command no mpls ip propagate-ttl? (Choose three.) 

A. It prevents the TTL from being copied from the IP header to the MPLS header. 

B. It prevents the MPLS hops from being visible to a CE router when you perform a traceroute. 

C. A fixed TTL value of 255 is used for the first label of the IP packet. 

D. It prevents the TTL from being copied from the MPLS header back into the IP header. 

E. MPLS hops remain visible on a CE router when you perform a traceroute. 

F. A fixed TTL value of 1 is used for the first label of the IP packet. 

Answer: A,B,C 

Q480. Which three types of traffic are allowed by IEEE 802.1X access control prior to getting authenticated? (Choose three.) 







Answer: A,C,E 


Until the client is authenticated, IEEE 802.1x access control allows only Extensible Authentication Protocol over LAN (EAPOL), Cisco Discovery Protocol (CDP), and Spanning Tree Protocol (STP) traffic through the port to which the client is connected. After authentication, normal traffic passes through the port. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750/software/release/15-0_2_se/configuration/guide/scg3750/sw8021x.pdf 

To know more about the 400-101, click here.

Tagged as : Cisco 400-101 Dumps, Download 400-101 pdf, 400-101 VCE, 400-101 pass4sure, examcollection 400-101