Theres a simple quite normal misunderstanding for the Cisco 400-101 examination accreditation that its a quite challenging style of accreditation for being achieved. However that is a thoroughly bogus suggestion. It merely requires the appropriate 400-101 research materials and youll be on your way toward results. Though there are lots of web-sites which will conduct this, most of them are frequently fake or unwanted. Consequently, be very careful also very important inside your range of your website.
Q371. Which two statements about BPDU guard are true? (Choose two.)
A. The global configuration command spanning-tree portfast bpduguard default shuts down interfaces that are in the PortFast-operational state when a BPDU is received on that port.
B. The interface configuration command spanning-tree portfast bpduguard enable shuts down only interfaces with PortFast enabled when a BPDU is received.
C. BPDU guard can be used to prevent an access port from participating in the spanning tree in the service provider environment.
D. BPDU guard can be used to protect the root port.
E. BPDU guard can be used to prevent an invalid BPDU from propagating throughout the network.
Q372. Which two statements about redistribution are true? (Choose two.)
A. When BGP traffic is redistributed into OSPF, the metric is set to 1 unless the metric is defined.
B. When EIGRP routes on a CE are redistributed through a PE into BGP, the Cost Community POI is set automatically.
C. When OSPF traffic is redistributed into BGP, internal and external routes are redistributed.
D. When BGP traffic is redistributed into OSPF, eBGP and iBGP routes are advertised.
E. iBGP routes automatically redistribute into the IGP if the routes are in the routing table.
F. When EIGRP traffic is redistributed into BGP, a default metric is required.
Q373. DRAG DROP
Drag each traceroute text character on the left to its meaning on the right.
Q374. Refer to the exhibit.
If a port is configured as shown and receives an untagged frame, of which VLAN will the untagged frame be a member?
A. VLAN 1
B. VLAN 2
C. VLAN 3
D. VLAN 4
When typing: Switch(config-if)#switchport mode?
access Set trunking mode to ACCESS unconditionally
dynamic Set trunking mode to dynamically negotiate access or trunk mode
trunk Set trunking mode to TRUNK unconditionally
Switch(config-if)#switchport mode dynamic?
auto Set trunking mode dynamic negotiation parameter to AUTO
desirable Set trunking mode dynamic negotiation parameter to DESIRABLE
So if we configure Fa0/1 as dynamic auto mode, it will not initiate any negotitation but waiting for the other end negotiate to be a trunk with DTP. If the other end does not ask it to become a trunk then it will become an access port. Therefore when using the “show interface fastEthernet0/1 switchport” command we will see two output lines “ Administrative Mode. dynamic auto” and “Operational Mode. static access” Note. To set this port to VLAN 2 as the output above just use one additional command. “switchport access vlan 2”.
Now back to our question, from the output we see that Fa0/1 is operating as an access port on VLAN 2 so if it receive untagged frame it will suppose that frame is coming from VLAN 2.
Q375. Which two values are needed to configure NTP authentication? (Choose two.)
A. the encryption method
B. the key number
C. the burst mode
D. the key string
E. the Diffie-Hellman group
Q376. When deploying redundant route reflectors in BGP, which attribute can you configure on the route reflector to allow routes to be identified as belonging to the same group?
Together, a route reflector and its clients form a cluster. When a single route reflector is deployed in a cluster, the cluster is identified by the router ID of the route reflector. The bgp cluster-id command is used to assign a cluster ID to a route reflector when the cluster has one or more route reflectors. Multiple route reflectors are deployed in a cluster to increase redundancy and avoid a single point of failure. When multiple route reflectors are configured in a cluster, the same cluster ID is assigned to all route reflectors. This allows all route reflectors in the cluster to recognize updates from peers in the same cluster and reduces the number of updates that need to be stored in BGP routing tables.
Q377. Which three characteristics are shared by subinterfaces and associated EVNs? (Choose three.)
A. IP address
B. routing table
C. forwarding table
D. access control lists
E. NetFlow configuration
Q378. What are the three variants of NTPv4? (Choose three.)
Q379. What is the maximum number of secondary IP addresses that can be configured on a router interface?
F. no limit to the number of addresses
From “IP Routing Frequently Asked Questions”
Q. What are the maximum number of secondary IP addesses that can be configured on a router interface?
.A. There are no limits on configuring secondary IP addresses on a router interface.
Q380. What is Nagle's algorithm used for?
A. To increase the latency
B. To calculate the best path in distance vector routing protocols
C. To calculate the best path in link state routing protocols
D. To resolve issues caused by poorly implemented TCP flow control.
Silly window syndrome is a problem in computer networking caused by poorly implemented TCP flow control. A serious problem can arise in the sliding window operation when the sending application program creates data slowly, the receiving application program consumes data slowly, or both. If a server with this problem is unable to process all incoming data, it requests that its clients reduce the amount of data they send at a time (the window setting on a TCP packet). If the server continues to be unable to process all incoming data, the window becomes smaller and smaller, sometimes to the point that the data transmitted is smaller than the packet header, making data transmission extremely inefficient. The name of this problem is due to the window size shrinking to a "silly" value. When there is no synchronization between the sender and receiver regarding capacity of the flow of data or the size of the packet, the window syndrome problem is created. When the silly window syndrome is created by the sender, Nagle's algorithm is used. Nagle's solution requires that the sender sends the first segment even if it is a small one, then that it waits until an ACK is received or a maximum sized segment (MSS) is accumulated.
To know more about the 400-101, click here.