Exam Code: 400-101 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CCIE Routing and Switching (v5.0)
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass 400-101 Exam.
Q271. Which statement about LISP encapsulation in an EIGRP OTP implementation is true?
A. OTP uses LISP encapsulation for dynamic multipoint tunneling.
B. OTP maintains the LISP control plane.
C. OTP uses LISP encapsulation to obtain routes from neighbors.
D. LISP learns the next hop.
Q272. Which statement is true about IGMP?
A. Multicast sources send IGMP messages to their first-hop router, which then generates a PIM join message that is then sent to the RP.
B. Multicast receivers send IGMP messages to their first-hop router, which then forwards the IGMP messages to the RP.
C. IGMP messages are encapsulated in PIM register messages and sent to the RP.
D. Multicast receivers send IGMP messages to signal their interest to receive traffic for specific multicast groups.
In the example shown above, the receivers (the designated multicast group) are interested in receiving the video data stream from the source. The receivers indicate their interest by sending an Internet Group Management Protocol (IGMP) host report to the routers in the network. The routers are then responsible for delivering the data from the source to the receivers.
Q273. Refer to the exhibit.
Which AS paths are matched by this access list?
A. the origin AS 64496 only
B. the origin AS 64496 and any ASs after AS 64496
C. the directly attached AS 64496 and any ASs directly attached to AS 64496
D. the directly attached AS 64496 and any longer AS paths
If you want AS 1 to get networks originated from AS 4 and all directly attached ASs of AS 4, apply the following inbound filter on Router 1. ip as-path access-list 1 permit ^4_[0-9]*$ router bgp 1 neighbor 22.214.171.124 remote-as 4 neighbor 126.96.36.199 route-map foo in route-map foo permit 10 match as-path 1 In the ip as-path access-list command, the carat (^) starts the input string and designates "AS". The underscore (_) means there is a a null string in the string that follows "AS 4". The [0-9]* specifies that any connected AS with a valid AS number can pass the filter. The advantage of using the [0-9]* syntax is that it gives you the flexibility to add any number of ASs without modifying this command string.
Q274. Which three statements about GET VPN are true? (Choose three.)
A. It encrypts WAN traffic to increase data security and provide transport authentication.
B. It provides direct communication between sites, which reduces latency and jitter.
C. It can secure IP multicast, unicast, and broadcast group traffic.
D. It uses a centralized key server for membership control.
E. It enables the router to configure tunnels.
F. It maintains full-mesh connectivity for IP networks.
Cisco GET VPN Features and Benefits
Description and Benefit
Key Servers are responsible for ensuring that keys are granted to authenticated and authorized devices only. They maintain the freshness of the key material, pushing re-key messages as well as security policies on a regular basis. The chief characteristics include:
. Key Servers can be located centrally, granting easy control over membership.
. Key Servers are not in the "line of fire" - encrypted application traffic flows directly between VPN end points without a bottleneck or an additional point of failure.
. Supports both local and global policies, applicable to all members in a group - such as "Permit any any", a policy to encrypt all traffic.
. Supports IP Multicast to distribute and manage keys, for improved efficiency; Unicast is also supported where IP Multicast is not possible.
Scalability and Throughput
. The full mesh nature of the solution allows devices to communicate directly with each other, without requiring transport through a central hub; this minimizes extra encrypts and decrypts at the hub router; it also helps minimize latency and jitter.
. Efficient handling of IP Multicast traffic by using the core network for replication can boost effective throughput further
Provides data security and transport authentication, helping to meet security compliance and internal regulation by encrypting all WAN traffic
Q275. Which two statements about Metro Ethernet services are true? (Choose two.)
A. EPL is a point-to-point service from one customer site to another across an MPLS
B. EVPL is a multipoint service that emulates a LAN over an MPLS backbone.
C. EPLAN is a multipoint service that emulates a LAN over an MPLS backbone.
D. EVPL is a point-to-point service from one customer site to another across an MPLS backbone.
E. ELAN is a point-to-point service from one customer site to another across an MPLS backbone.
F. EVPL is a multipoint service with a root node that is suitable for multicast services.
Q276. Which two commands enable OSPF graceful shutdown? (Choose two.)
A. nsf cisco
B. ip ospf shutdown
D. nsf ietf helper disable
Q277. Which statement about a P router in a Layer 3 MPLS VPN is true?
A. It is unaware of VPN routes.
B. It connects to customer edge routers.
C. It participates in MPLS VPN routing.
D. It uses the running IGP to share VPN routes.
Q278. Which two statements about SNMP are true? (Choose two.)
A. SNMPv3 provides privacy and access control.
B. All SNMP versions use get, getNext, and getBulk operations.
C. SNMPv3 uses encrypted community strings.
D. SNMPv1 and SNMPv2c use plaintext community strings.
E. All SNMP versions support bulk retrieval and detailed error messages.
Q279. Which two statements about MAC ACLs are true? (Choose two.)
A. They support only inbound filtering.
B. They support both inbound and outbound filtering.
C. They are configured with the command mac access-list standard.
D. They can filter non-IP traffic on a VLAN and on a physical interface.
MAC ACL, also known as Ethernet ACL, can filter non-IP traffic on a VLAN and on a physical Layer 2 interface by using MAC addresses in a named MAC extended ACL. The steps to configure a MAC ACL are similar to those of extended named ACLs. MAC ACL supports only inbound traffic filtering.
Q280. Which option describes a limitation of Embedded Packet Capture?
A. It can capture data only on physical interfaces and subinterfaces.
B. It can store only packet data.
C. It can capture multicast packets only on ingress.
D. It can capture multicast packets only on egress.
Restrictions for Embedded Packet Capture
. In Cisco IOS Release 12.2(33)SRE, EPC is supported only on 7200 platform.
. EPC only captures multicast packets on ingress and does not capture the replicated packets on egress.
. Currently, the capture file can only be exported off the device; for example, TFTP or FTP servers and local disk.
To know more about the 400-101, click here.