400-101 Guide

400-101 Exam Royal Pack (In Stock.)

 
  • Cisco
  • Exam Number/Code 400-101
  • Product Name CCIE Routing and Switching (v5.0)
  • Questions and Answers
  • 911 Q&As
  • Last Updated
  • Jun 18,2018
  • List Price
  • $128.99
  • Price
  • Today 49.99 USD

Free TrialVersion: demo Buy Now 50% OFF

Surprising latest ccie r&s dumps

Want to know Ucertify 400-101 Exam practice test features? Want to lear more about Cisco CCIE Routing and Switching (v5.0) certification experience? Study Tested Cisco 400-101 answers to Regenerate 400-101 questions at Ucertify. Gat a success with an absolute guarantee to pass Cisco 400-101 (CCIE Routing and Switching (v5.0)) test on your first attempt.

2016 Oct 400-101 ccie written passing score:

Q471. DRAG DROP 

Drag and drop the events on the left to dispaly the correct sequence on the right when CoPP is enabled. 

Answer: 


Q472. Which option is the Cisco recommended method to secure access to the console port? 

A. Configure the activation-character command. 

B. Configure a very short timeout (less than 100 milliseconds) for the port. 

C. Set the privilege level to a value less than 15.

D. Configure an ACL. 

Answer:

Explanation: 

The activation-character command defines a session activation character. Entering this character at a vacant terminal begins a terminal session. The default activation character is the Return key 

To secure the console port, you should change this character to a different one as most people simply hit the enter key when trying to access the console. 


Q473. Which two statements about DHCP snooping are true? (Choose two.) 

A. It is implemented on a per-VLAN basis. 

B. It filters invalid DHCP messages. 

C. The binding database logs trusted and untrusted hosts with leased IP addresses. 

D. Interfaces are trusted by default. 

E. It uses the LFIB to validate requests from untrusted hosts. 

Answer: A,B 


Q474. Refer to the exhibit. 

The customer wants to use IP SLA to create a failover to ISP2 when both Ethernet connections to ISP1 are down. The customer also requires that both connections to ISP1 are utilized during normal operations. 

Which IP route configuration accomplishes these requirements for the customer? 

A. ip route 0.0.0.0 0.0.0.0 192.168.0.1 track 1 

ip route 0.0.0.0 0.0.0.0 192.168.1.1 track 2 

ip route 0.0.0.0 0.0.0.0 192.168.2.1 track 3 

B. ip route 0.0.0.0 0.0.0.0 192.168.0.1 track 1 

ip route 0.0.0.0 0.0.0.0 192.168.1.1 track 2 

ip route 0.0.0.0 0.0.0.0 192.168.2.1 track 4.100 

C. ip route 0.0.0.0 0.0.0.0 192.168.0.1 track 1 

ip route 0.0.0.0 0.0.0.0 192.168.1.1 track 2 

ip route 0.0.0.0 0.0.0.0 192.168.2.1 track 3.100 

D. ip route 0.0.0.0 0.0.0.0 192.168.0.1 track 1 1 

ip route 0.0.0.0 0.0.0.0 192.168.1.1 track 2 2 

ip route 0.0.0.0 0.0.0.0 192.168.2.1 track 3 3 

Answer:


Q475. Refer to the exhibit. 

Which two statements about this capture are true? (Choose two.) 

A. It is set to run for five minutes. 

B. It continues to capture data after the buffer is full. 

C. It is set to run for a period of 00:03:26. 

D. It captures data only until the buffer is full. 

E. It is set to use the default buffer type. 

Answer: A,B 


Rebirth ccie dumps 400-101:

Q476. Refer to the exhibit. 

Which two statements about how the configuration processes Telnet traffic are true? (Choose two.) 

A. Telnet traffic from 10.1.1.9 to 10.10.10.1 is dropped. 

B. All Telnet traffic is dropped. 

C. Telnet traffic from 10.10.10.1 to 10.1.1.9 is permitted. 

D. Telnet traffic from 10.1.1.9 to 10.10.10.1 is permitted. 

E. Telnet traffic is permitted to all IP addresses. 

Answer: A,C 

Explanation: 

The ACL applied to the COPP policy matches only telnet traffic from 10.1.1.9 to 10.10.10.1, all other telnet traffic is not matched and therefore not used in the COPP policy, which means this traffic will be handled normally (accepted). For telnet traffic from 10.1.1.9 to 10.10.10.1, the COPP policy has defined this traffic as an exceed, and dropped. 


Q477. DRAG DROP 

Drag and drop the multicast protocol definition on the left to the correct default time interval on the right. 

Answer: 


Q478. Which two statements about the ipv6 ospf authentication command are true? (Choose two.) 

A. The command is required if you implement the IPsec AH header. 

B. The command configures an SPI. 

C. The command is required if you implement the IPsec TLV. 

D. The command can be used in conjunction with the SPI authentication algorithm. 

E. The command must be configured under the OSPFv3 process. 

Answer: A,B 

Explanation: 

OSPFv3 requires the use of IPsec to enable authentication. Crypto images are required to use authentication, because only crypto images include the IPsec API needed for use with OSPFv3. In OSPFv3, authentication fields have been removed from OSPFv3 packet headers. When OSPFv3 runs on IPv6, OSPFv3 requires the IPv6 authentication header (AH) or IPv6 ESP header to ensure integrity, authentication, and confidentiality of routing exchanges. IPv6 AH and ESP extension headers can be used to provide authentication and confidentiality to OSPFv3. To use the IPsec AH, you must enable the ipv6 ospf authentication command. To use the IPsec ESP header, you must enable the ipv6 ospf encryption command. The ESP header may be applied alone or in combination with the AH, and when ESP is used, both encryption and authentication are provided. Security services can be provided between a pair of communicating hosts, between a pair of communicating security gateways, or between a security gateway and a host. To configure IPsec, you configure a security policy, which is a combination of the security policy index (SPI) and the key (the key is used to create and validate the hash value). IPsec for OSPFv3 can be configured on an interface or on an OSPFv3 area. For higher security, you should configure a different policy on each interface configured with IPsec. If you configure IPsec for an OSPFv3 area, the policy is applied to all of the interfaces in that area, except for the interfaces that have IPsec configured directly. Once IPsec is configured for OSPFv3, IPsec is invisible to you. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_ospf/configuration/15-sy/iro-15-sy-book/ip6-route-ospfv3-auth-ipsec.html 


Q479. Which two statements about SNMP traps are true? (Choose two.) 

A. They are sent by an agent after a specified event. 

B. They are sent when solicited after a specified event. 

C. They are equivalent to a community string. 

D. They provide solicited data to the manager. 

E. They are sent by a management station to an agent. 

F. Vendor-specific traps can be configured. 

Answer: A,F 

Explanation: 

The SNMP agent contains MIB variables whose values the SNMP manager can request or change. A manager can get a value from an agent or store a value into the agent. The agent gathers data from the MIB, the repository for information about device parameters and network data. The agent can also respond to a manager's requests to get or set data. An agent can send unsolicited traps to the manager. Traps are messages alerting the SNMP manager to a condition on the network. Traps can mean improper user authentication, restarts, link status (up or down), MAC address tracking, closing of a TCP connection, loss of connection to a neighbor, or other significant events. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_55_se/configuration/guide/scg_2960/swsnmp.html 


Q480. Two routers are trying to establish an OSPFv3 adjacency over an Ethernet link, but the adjacency is not forming. Which two options are possible reasons that prevent OSPFv3 to form between these two routers? (Choose two.) 

A. mismatch of subnet masks 

B. mismatch of network types 

C. mismatch of authentication types 

D. mismatch of instance IDs 

E. mismatch of area types 

Answer: D,E 

Explanation: 

An OSPFv3 interface must have a compatible configuration with a remote interface before the two can be considered neighbors. The two OSPFv3 interfaces must match the following criteria: 

. Hello interval 

. Dead interval 

. Area ID 

. Optional capabilities 

The OSPFv3 header includes an instance ID field to identify that OSPFv3 packet for a particular OSPFv3 instance. You can assign the OSPFv3 instance. The interface drops all OSPFv3 packets that do not have a matching OSPFv3 instance ID in the packet header. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx-os/unicast/configuration/guide/l3_cli_nxos/l3_ospfv3.html 


To know more about the 400-101, click here.

Tagged as : Cisco 400-101 Dumps, Download 400-101 pdf, 400-101 VCE, 400-101 pass4sure, examcollection 400-101