400-101 Guide

400-101 Exam Royal Pack (In Stock.)

 
  • Cisco
  • Exam Number/Code 400-101
  • Product Name CCIE Routing and Switching (v5.0)
  • Questions and Answers
  • 911 Q&As
  • Last Updated
  • Jun 18,2018
  • List Price
  • $128.99
  • Price
  • Today 49.99 USD

Free TrialVersion: demo Buy Now 50% OFF

latest ccie r&s dumps (111 to 120)

You can create notes for the Pdf files. Download the analyze engine in your PC and commit one as well as two hours practicing the actual Cisco simulated test every single day. You can also visit our Encounter Exchange Forum in Examcollection home web page. And then converse with most our consumers who are the actual Cisco Cisco certification candidates. You will end up being better prepared to the 400-101 exam.

2016 Oct 400-101 ccie routing and switching pdf:

Q111. Which two options are two characteristics of the HSRPv6 protocol? (Choose two.) 

A. It uses virtual MAC addresses 0005.73a0.0000 through 0005.73a0.0fff. 

B. It uses UDP port number 2029. 

C. It uses virtual MAC addresses 0005.73a0.0000 through 0005.73a0.ffff. 

D. It uses UDP port number 2920. 

E. If a link local IPv6 address is used, it must have a prefix. 

Answer: A,B 

Explanation: 

HSRP IPv6 Virtual MAC Address Range 

HSRP IPv6 uses a different virtual MAC address block than does HSRP for IP: 0005.73A0.0000 through 0005.73A0.0FFF (4096 addresses) 

HSRP IPv6 UDP Port Number 

Port number 2029 has been assigned to HSRP IPv6. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/15-sy/fhp-15-sy-book/HSRP-for-IPv6.html 


Q112. Refer to the exhibit. 

Which IP packets will be accepted from EBGP neighbor 10.1.1.1? 

A. IP packets with a TTL count in the header that is equal to or greater than 253 

B. IP packets with a TTL count in the header that is equal to 253 

C. IP packets with a TTL count in the header that is equal to or greater than 2 

D. IP packets with a TTL count in the header that is equal to 2 

Answer:

Explanation: 

neighbor ip-address ttl-security hops hop-count 

ExamplE. 

Router(config-router)# neighbor 10.1.1.1 ttl-security hops 2 

Configures the maximum number of hops that separate two peers. 

. The hop-count argument is set to number of hops that separate the local and remote peer. 

If the expected TTL value in the IP packet header is 254, then the number 1 should be configured for the hop-count argument. The range of values is a number from 1 to 254. 

. When this feature is enabled, BGP will accept incoming IP packets with a TTL value that is 

equal to or greater than the expected TTL value. Packets that are not accepted are silently discarded. 

. The example configuration sets the expected incoming TTL value to at least 253, which is 255 minus the TTL value of 2, and this is the minimum TTL value expected from the BGP peer. The local router will accept the peering session from the 10.1.1.1 neighbor only if it is 1 or 2 hops away. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2s/feature/guide/fs_btsh.html 


Q113. Refer to the exhibit. 

How can Router X in AS70000 peer with Router Y in AS65000, in case Router Y supports only 2-byte ASNs? 

A. Router X should be configured with a remove-private-as command, because this will establish the peering session with a random private 2-byte ASN. 

B. It is not possible. Router Y must be upgraded to an image that supports 4-byte ASN. 

C. Router Y should be configured with a 4-byte AS using the local-as command. 

D. Router X should be configured with a 2-byte AS using the local-as command. 

Answer:

Explanation: 

Since router Y does not support 4-byte ASN,s it will not understand any AS numbers larger than 65535, so router X should use the local-as command on the peering statement to router Y to so that it sends in a 2-byte ASN to router Y. 


Q114. Refer to the exhibit. 

Which statement is true? 

A. This is an MPLS TE point-to-multipoint LSP in an MPLS network. 

B. This is an MPLS TE multipoint-to-point LSP in an MPLS network. 

C. This is a point-to-multipoint LSP in an MPLS network. 

D. This is a multipoint-to-multipoint LSP in an MPLS network. 

Answer:

Explanation: 

Same example of this provided on slide 24 at the reference link below: 

Reference: “mVPN Deployment Models” Cisco Live Presentation 

http://d2zmdbbm9feqrf.cloudfront.net/2014/eur/pdf/BRKIPM-2011.pdf, slide 24 


Q115. On which three options can Cisco PfR base its traffic routing? (Choose three.) 

A. Time of day 

B. An access list with permit or deny statements 

C. Load-balancing requirements 

D. Network performance 

E. User-defined link capacity thresholds 

F. Router IOS version 

Answer: C,D,E 

Explanation: 

Key Advantages of using PfR for Load balancing: 

. Utilization based load-balancing: PfR takes real-time link utilization into account when load balancing the links. This will ensure that a link will not go beyond a certain percentage of its maximum capacity (75% by default). 

. Application Performance based Load Balancing: PfR does not randomly forward traffic through one link or another. It takes application performance requirements into consideration and then forwards the traffic through a link which meets the performance policy requirements. PfR also load balances the link at the same time. 

. Bi-directional Solution: PfR is a bi-directional load balancing solution which influences outbound as well as in-bound traffic. 

. Consolidated Centralized View: PfR offers consolidated and centralized view of the state of all external links in the network. At any given time, the network administrator can see the current link utilization (in kbps and percentage of its capacity), maximum link threshold, and the policies applied to the links in the network. 

Reference: http://docwiki.cisco.com/wiki/PfR:Solutions:InternetOutboundLoadBalancing 


Improve latest ccie r&s dumps:

Q116. Refer to the exhibit. 

At which location will the benefit of this configuration be observed? 

A. on Router A and its upstream routers B. on Router A and its downstream routers 

C. on Router A only 

D. on Router A and all of its ARP neighbors 

Answer:

Explanation: 

The following example shows how to configure the router (and downstream routers) to drop all options packets that enter the network: Router(config)# ip options drop 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/sel_drop.html 


Q117. Which statement is true about VPLS? 

A. MPLS is not required for VPLS to work. 

B. VPLS carries packets as Layer 3 multicast. 

C. VPLS has been introduced to address some shortcomings of OTV. 

D. VPLS requires an MPLS network. 

Answer:

Explanation: 

VPLS uses MPLS labels so an MPLS network is required. VPLS MPLS packets have a two-label stack. The outer label is used for normal MPLS forwarding in the service provider's network. If BGP is used to establish the VPLS, the inner label is allocated by a PE as part of a label block. If LDP is used, the inner label is a virtual circuit ID assigned by LDP when it first established a mesh between the participating PEs. Every PE keeps track of assigned inner label, and associates these with the VPLS instance. 

Reference: http://en.wikipedia.org/wiki/Virtual_Private_LAN_Service 


Q118. Refer to the exhibit. 

Which statement about configuring the switch to manage traffic is true? 

A. The switchport priority extend cos command on interface FastEthernet0/0 prevents traffic to and from the PC from taking advantage of the high-priority data queue that is assigned to the IP phone. 

B. The switchport priority extend cos command on interface FastEthernet0/0 enables traffic to and from the PC to use the high priority data queue that is assigned to the IP phone. 

C. When the switch is configured to trust the CoS label of incoming traffic, the trusted boundary feature is disabled automatically. 

D. The mls qos cos override command on interface FastEthernet0/0 configures the port to trust the CoS label of traffic to and from the PC. 

Answer:

Explanation: 

In some situations, you can prevent a PC connected to the Cisco IP Phone from taking advantage of a high-priority data queue. You can use the switchport priority extend cos interface configuration command to configure the telephone through the switch CLI to override the priority of the traffic received from the PC. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2950/software/release/12-1_22_ea2/configuration/guide/2950scg/swqos.html 


Q119. In which two situations is an EIGRP hello packet sent as unicast? (Choose two.) 

A. during neighbor discovery 

B. when link costs change 

C. when the neighbor command is used 

D. when an ACK is sent 

Answer: C,D 


Q120. Refer to the exhibit. 

R1 is able to reach only some of the subnets that R2 is advertising. Which two configuration changes can you make to ensure that R1 can reach all routes from R2? (Choose two.) 

A. Add an additional permit statement to the LOOPBACKS route map. 

B. Modify the LOOPBACKS access list to include all loopback subnets. 

C. Add an additional statement in the LOOPBACKS route map to match both Level 1 and Level 2 circuits. 

D. Add an additional statement in the LOOPBACKS route map to match the R1 CLNS address. 

E. Configure the interfaces between R1 and R2 with a Level 1 IS-IS circuit. 

F. Configure the interfaces between R1 and R2 with a Level 2 IS-IS circuit. 

Answer: A,B 

Explanation: 

In this example, the access list is using a 0.0.3.255 wildcard mask, so only the loopback IP’s of 172.16.0.0 – 172.16.3.255 will be included. We need to add another statement to allow loopback 4 to be advertised, or modify the wildcard mask to include them all. 


To know more about the 400-101, click here.

Tagged as : Cisco 400-101 Dumps, Download 400-101 pdf, 400-101 VCE, 400-101 pass4sure, examcollection 400-101