400-101 Guide

400-101 Exam Royal Pack (In Stock.)

  • Cisco
  • Exam Number/Code 400-101
  • Product Name CCIE Routing and Switching (v5.0)
  • Questions and Answers
  • 911 Q&As
  • Last Updated
  • Jun 18,2018
  • List Price
  • $128.99
  • Price
  • Today 49.99 USD

Free TrialVersion: demo Buy Now 50% OFF

Secrets to 400-101 ccie routing and switching written exam fee

It is more faster and easier to pass the Cisco 400-101 exam by using Actual Cisco CCIE Routing and Switching (v5.0) questuins and answers. Immediate access to the Latest 400-101 Exam and find the same core area 400-101 questions with professionally verified answers, then PASS your exam with a high score now.

2016 Nov 400-101 ccie dumps free download:


Drag and drop each BGP attribute on the left to the matching description on the right. 


Q162. Refer to the exhibit. 

If router R1 is functioning as a DHCPv6 server and you enter the command show ipv6 dhcp binding, which two options are pieces of information in the output? (Choose two.) 

A. The IA PD 

B. The DUID 

C. The prefix pool 

D. The DNS server 

E. The Rapid-Commit setting 

Answer: A,B 


In the following example, the show ipv6 dhcp binding command shows information about two clients, including their DUIDs, IAPDs, prefixes, and preferred and valid lifetimes: 

Router# show ipv6 dhcp binding 

Client: FE80::202:FCFF:FEA5:DC39 (GigabitEthernet2/1/0) 

DUID. 000300010002FCA5DC1C 

IA PD. IA ID 0x00040001, T1 0, T2 0 

Prefix: 3FFE:C00:C18:11::/68 

preferred lifetime 180, valid lifetime 12345 

expires at Nov 08 2002 02:24 PM (12320 seconds) 

Client: FE80::202:FCFF:FEA5:C039 (GigabitEthernet2/1/0) 

DUID. 000300010002FCA5C01C 

IA PD. IA ID 0x00040001, T1 0, T2 0 

Prefix: 3FFE:C00:C18:1::/72 

preferred lifetime 240, valid lifetime 54321 

expires at Nov 09 2002 02:02 AM (54246 seconds) 

Prefix: 3FFE:C00:C18:2::/72 

preferred lifetime 300, valid lifetime 54333 

expires at Nov 09 2002 02:03 AM (54258 seconds) 

Prefix: 3FFE:C00:C18:3::/72 

preferred lifetime 280, valid lifetime 51111 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_dhcp/configuration/xe-3s/dhcp-xe-3s-book/ip6-dhcp-prefix-xe.html 

Q163. You are configuring a DMVPN spoke to use IPsec over a physical interface that is located within a VRF. For which three configuration sections must you specify the VRF name? (Choose three.) 

A. the ISAKMP profile 

B. the crypto keyring 

C. the IPsec profile 

D. the IPsec transform set 

E. the tunnel interface 

F. the physical interface 

Answer: B,E,F 


ip vrf forwardingvrf-name 


Router(config-if)# ip vrf forwarding green 

Associates a virtual private network (VPN) routing and forwarding (VRF) instance with an interface or subinterface. 

. vrf-name is the name assigned to a VRF. 

Router(config-if)# tunnel vrfvrf-name 


Router(config-if)# tunnel vrf finance1 

Associates a VPN routing and forwarding (VRF) instance with a specific tunnel destination. vrf-name is the name assigned to a VRF. 

Router(config)# crypto keyringkeyring-name [vrf fvrf-name] 

Defines a crypto keyring to be used during IKE authentication and enters keyring configuration mode. 

. keyring-name—Name of the crypto keyring. 

. fvrf-name—(Optional) Front door virtual routing and forwarding (FVRF) name to which the keyring will be referenced. fvrf-name must match the FVRF name that was defined during virtual routing and forwarding (VRF) configuration 


Drag and drop the LACP elements on the left into the correct priority order in the hot-standby port-selection process on the right. 



Drag and drop the SNMP element on the left to the corresponding definition on the right. 


Update ccie dumps 400-101:

Q166. Which three protocols can use enhanced object tracking? (Choose three.) 


B. Proxy-ARP 





Answer: A,C,D 


The Enhanced Object Tracking feature separates the tracking mechanism from HSRP and creates a separate standalone tracking process that can be used by other processes and HSRP. This feature allows tracking of other objects in addition to the interface line-protocol state. A client process such as HSRP, Virtual Router Redundancy Protocol (VRRP), or Gateway Load Balancing Protocol (GLBP), can register its interest in tracking objects and then be notified when the tracked object changes state. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp/configuration/15-mt/iap-15-mt-book/iap-eot.html 

Q167. You are configuring Wireshark on a Cisco Catalyst 4500E Switch with a Supervisor 8. Which three actions can you take to prevent the capture from overloading the CPU? (Choose three.) 

A. Attach the specific ports that are part of the data path. 

B. Use an in-line filter. 

C. Use an appropriate ACL. 

D. Add memory to the Supervisor. 

E. Reconfigure the buffers to accommodate the additional traffic. 

F. Configure a policy map, class map, and an access list to express the match conditions. 

Answer: A,B,C 


Because packet forwarding typically occurs in hardware, packets are not copied to the CPU for software processing. For Wireshark packet capture, packets are copied and delivered to the CPU, which causes an increase in CPU usage. To avoid high CPU, do the following: 

. Attach only relevant ports. 

. Use a class map, and secondarily, an access list to express match conditions. If neither is viable, use an explicit, in-line filter. 

. Adhere closely to the filter rules. Restrict the traffic type (such as, IPv4 only) with a restrictive, rather than relaxed ACL, which elicits unwanted traffic. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/15-1-2/XE_340/configuration/guide/config/wireshrk.pdf 

Q168. Which problem can result when private AS numbers are included in advertisements that are sent to the global Internet BGP table? 

A. The prefixes sent with private AS numbers are always discarded on the Internet. 

B. The prefixes sent with private AS numbers are always tagged as invalid on the Internet. 

C. The prefixes sent with private AS numbers lack uniqueness, which can lead to a loss of connectivity. 

D. The prefixes sent with private AS numbers are sometimes tagged as invalid on the Internet. 



Private AS numbers are not meant to be used for global Internet BGP routing, as they are assigned locally and can be used by any organization. They are meant to enable BGP within a enterprise or VPN, but since these numbers can be used by any organization they are not unique and could cause connectivity loss if leaked to the Internet. 



Q170. Which VPN technology requires the use of an external key server? 





E. IPsec F. L2TPv3 



A GETVPN deployment has primarily three components, Key Server (KS), Group Member (GM), and Group Domain of Interpretation (GDOI) protocol. GMs do encrypt/decrypt the traffic and KS distribute the encryption key to all the group members. The KS decides on one single data encryption key for a given life time. Since all GMs use the same key, any GM can decrypt the traffic encrypted by any other GM. GDOI protocol is used between the GM and KS for group key and group SA management. Minimum one KS is required for a GETVPN deployment. 

Reference: http://www.cisco.com/c/en/us/products/collateral/security/group-encrypted-transport-vpn/deployment_guide_c07_554713.html 

To know more about the 400-101, click here.

Tagged as : Cisco 400-101 Dumps, Download 400-101 pdf, 400-101 VCE, 400-101 pass4sure, examcollection 400-101