400-101 Guide

400-101 Exam Royal Pack (In Stock.)

 
  • Cisco
  • Exam Number/Code 400-101
  • Product Name CCIE Routing and Switching (v5.0)
  • Questions and Answers
  • 911 Q&As
  • Last Updated
  • Jun 18,2018
  • List Price
  • $128.99
  • Price
  • Today 49.99 USD

Free TrialVersion: demo Buy Now 50% OFF

Surprising 400 101 pdf

Pass4sure 400 101 ccie Questions are updated and all 400 101 pdf answers are verified by experts. Once you have completely prepared with our 400 101 ccie exam prep kits you will be ready for the real cisco 400 101 exam without a problem. We have Up to the minute Cisco exam 400 101 dumps study guide. PASSED ccie 400 101 dumps First attempt! Here What I Did.

Q141. Which two statements about BGP loop prevention are true? (Choose two.) 

A. Advertisements from PE routers with per-neighbor SOO configured include a Site of Origin value that is equal to the configured value of the BGP peering. 

B. If the configured Site of Origin value of a BGP peering is equal to the Site of Origin value on a route it receives, route advertisement is blocked to prevent a route loop. 

C. AS-override aids BGP loop prevention, but alternate loop prevention mechanisms are also necessary. 

D. Advertisements from the neighbors a BGP peering include a Site of Origin value that is separate from the configured value of the BGP peering. 

E. If the configured Site of Origin value of a BGP peering is greater than the Site of Origin value on a route it receives, route advertisement is blocked to prevent a route loop. 

F. If the configured Site of Origin value of a BGP peering is equal to the Site of Origin value on a route it receives, route advertisement is permitted. 

Answer: A,B 


Q142. Which technology can be used to secure the core of an STP domain? 

A. UplinkFast 

B. BPDU guard 

C. BPDU filter 

D. root guard 

Answer:

Explanation: 

Since STP does not implement any authentication or encryption to protect the exchange of BPDUs, it is vulnerable to unauthorized participation and attacks. Cisco IOS offers the STP Root Guard feature to enforce the placement of the root bridge and secure the core of the STP domain. 

STP root guard forces a port to become a designated port so that no switch on the other end of the link can become a root switch. If a port configured for root guard receives a superior BPDU, the port it is received on is blocked. In this way, STP root guard blocks other devices from trying to become the root bridge. 

STP root guard should be enabled on all ports that will never connect to a root bridge, for example, all end user ports. This ensures that a root bridge will never be negotiated on those ports. 

Reference: http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/Baseline_Security/secur ebasebook/sec_chap7.html 


Q143. Which two statements about the C-bit and PW type are true? (Choose two.) 

A. The C-bit is 1 byte and the PW type is 15 bytes. 

B. The PW type indicates the type of pseudowire. 

C. The C-bit is 3 bits and the PW type is 10 bits. 

D. The C-bit set to 1 indicates a control word is present. 

E. The PW type indicates the encryption type. 

Answer: B,D 

Explanation: 

The control word carries generic and Layer 2 payload-specific information. If the C-bit is set to 1, the advertising PE expects the control word to be present in every pseudowire packet on the pseudowire that is being signaled. If the C-bit is set to 0, no control word is expected to be present. Pseudowire Type—PW Type is a 15-bit field that represents the type of pseudowire. 

Reference: http://www.ciscopress.com/articles/article.asp?p=386788&seqNum=2 


Q144. Which ICMP message type is used to assist path MTU discovery? 

A. destination unreachable 

B. redirect message 

C. source quench 

D. time exceeded 

Answer:


Q145. DRAG DROP 

Drag and drop each description of IPv6 transition technology on the left to the matching IPv6 transition technology category on the right. 

Answer: 


Q146. Which two statements are characteristics of Ethernet private LAN circuits? (Choose two.) 

A. They support communication between two or more customer endpoints. 

B. They utilize more than one bridge domain. 

C. They support point-to-multipoint EVC. 

D. They support multipoint-to-multipoint EVC. 

Answer: A,D 

Explanation: 

An Ethernet Private LAN (EPLAN) is a multipoint–to–multipoint EVC. EPLAN is an EVC that supports communication between two or more UNIs. In EPLAN, only one EVC can exist on a port and the port can have only one EFP. 

Reference: https://www.cisco.com/c/en/us/td/docs/optical/cpt/r9_3/configuration/guide/cpt93_configurat ion/cpt93_configuration_chapter_0100.pdf 


Q147. Which three statements about DMVPN are true? (Choose three.) 

A. It facilitates zero-touch configuration for addition of new spokes. 

B. It supports dynamically addressed spokes using DHCP. 

C. It features automatic IPsec triggering for building an IPsec tunnel. 

D. It requires uses of IPsec to build the DMVPN cloud. 

E. Spokes can build tunnels to other spokes and exchange traffic directly. 

F. It supports server load balancing on the spokes. 

Answer: A,C,E 


Q148. What are the three HDLC operating modes? (Choose three.) 

A. normal response 

B. asynchronous balanced 

C. synchronous response 

D. asynchronous response 

E. normal balanced 

F. synchronous balanced 

Answer: A,B,D 


Q149. Which action does route poisoning take that serves as a loop-prevention method? 

A. It immediately sends routing updates with an unreachable metric to all devices. 

B. It immediately sends routing updates with a metric of 255 to all devices. 

C. It prohibits a router from advertising back onto the interface from which it was learned. 

D. It advertises a route with an unreachable metric back onto the interface from which it was learned. 

E. It poisons the route by tagging it uniquely within the network. 

Answer:

Explanation: 

With route poisoning, when a router detects that one of its connected routes has failed, the router will poison the route by assigning an infinite metric to it and advertising it to neighbors. 


Q150. Which statement describes the native VLAN concept in an ISL trunk? 

A. It is the VLAN ID that is assigned to untagged packets. 

B. It is the VLAN with highest priority. 

C. It is the default VLAN for a trunk. 

D. There is no native VLAN concept in an ISL trunk. 

Answer:

Explanation: 

ISL has no native VLAN concept because it places the entire Ethernet frame in the payload of an ISL frame. Native VLANs is an 802.1Q specific concept 


To know more about the 400-101, click here.

Tagged as : Cisco 400-101 Dumps, Download 400-101 pdf, 400-101 VCE, 400-101 pass4sure, examcollection 400-101