Cause all that matters here is passing the Cisco 400-101 exam. Cause all that you need is a high score of 400-101 CCIE Routing and Switching (v5.0) exam. The only one thing you need to do is downloading Testking 400-101 exam study guides now. We will not let you down with our money-back guarantee.
Q81. Which option is a core event publisher for EEM?
B. Policy Director
EEM is a flexible, policy-driven framework that supports in-box monitoring of different components of the system with the help of software agents known as event detectors. The figure below shows the relationship between the EEM server, core event publishers (event detectors), and the event subscribers (policies). Basically, event publishers screen events and publish them when there is a match on an event specification that is provided by the event subscriber. Event detectors notify the EEM server when an event of interest occurs. The EEM policies that are configured using the Cisco command-line interface (CLI) then implement recovery on the basis of the current state of the system and the actions specified in the policy for the given event. EEM offers the ability to monitor events and take informational or corrective action when the monitored events occur or when a threshold is reached. An EEM policy is an entity that defines an event and the actions to be taken when that event occurs. There are two types of EEM policies: an applet or a script. An applet is a simple form of policy that is defined within the CLI configuration. A script is a form of policy that is written in Tool Command Language (Tcl).
Figure 1. Embedded Event Manager Core Event Detectors
Q82. Which two statements about RSTP and MSTP BPDUs are true? (Choose two.)
A. MSTP switches can detect boundary ports when they receive RSTP version 2 BPDUs.
B. MSTP switches can detect boundary ports when they receive RSTP version 1 BPDUs.
C. RSTP switches can process MSTP version 3 BPDUs.
D. When all boundary switches are running RSTP, MST sends only version 0 configuration BPDUs.
A switch running both MSTP and RSTP supports a built-in protocol migration mechanism that enables it to interoperate with legacy 802.1D switches. If this switch receives a legacy 802.1D configuration BPDU (a BPDU with the protocol version set to 0), it sends only 802.1D BPDUs on that port. An MST switch can also detect that a port is at the boundary of a region when it receives a legacy BPDU, an MST BPDU (version 3) associated with a different region, or an RST BPDU (version 2).
Q83. DRAG DROP
Drag each SNMP term on the left to the matching definition on the right.
Q84. Refer to the exhibit.
Which statement about the configuration is true?
A. This configuration is incorrect because the dialer interface number must be the same as the dialer pool number.
B. This configuration is missing an IP address on the dialer interface.
C. This configuration is incorrect because the MTU must match the ppp-max-payload that is defined.
D. This configuration represents a complete PPPoE client configuration on an Ethernet connection.
Q85. In which type of EIGRP configuration is EIGRP IPv6 VRF-Lite available?
B. named mode
C. classic mode
The EIGRP IPv6 VRF Lite feature provides EIGRP IPv6 support for multiple VRFs. EIGRP for IPv6 can operate in the context of a VRF. The EIGRP IPv6 VRF Lite feature provides
separation between routing and forwarding, providing an additional level of security because no communication between devices belonging to different VRFs is allowed unless it is explicitly configured. The EIGRP IPv6 VRF Lite feature simplifies the management and troubleshooting of traffic belonging to a specific VRF. The EIGRP IPv6 VRF Lite feature is available only in EIGRP named configurations.
Q86. Refer to the exhibit.
Which statement is true?
A. This is an MPLS TE point-to-multipoint LSP in an MPLS network.
B. This is an MPLS TE multipoint-to-point LSP in an MPLS network.
C. This is a point-to-multipoint LSP in an MPLS network.
D. This is a multipoint-to-multipoint LSP in an MPLS network.
Same example of this provided on slide 24 at the reference link below:
Reference: “mVPN Deployment Models” Cisco Live Presentation
http://d2zmdbbm9feqrf.cloudfront.net/2014/eur/pdf/BRKIPM-2011.pdf, slide 24
Q87. Refer to the exhibit.
Which two statements are true? (Choose two.)
A. This is the output of the show ip ospf command.
B. This is the output of the show ip protocols command.
C. This router is an ABR.
D. This router is an ASBR.
E. Authentication is not configured for the area.
The following is sample output from the show ip ospf command when entered without a specific OSPF process ID with no authentication.
Router# show ip ospf
Routing Process "ospf 201" with ID 10.0.0.1 and Domain ID 10.20.0.1
Supports only single TOS(TOS0) routes
Supports opaque LSA
SPF schedule delay 5 secs, Hold time between two SPFs 10 secs
Minimum LSA interval 5 secs. Minimum LSA arrival 1 secs
LSA group pacing timer 100 secs
Interface flood pacing timer 55 msecs
Retransmission pacing timer 100 msecs
Number of external LSA 0. Checksum Sum 0x0
Number of opaque AS LSA 0. Checksum Sum 0x0
Number of DCbitless external and opaque AS LSA 0
Number of DoNotAge external and opaque AS LSA 0
Number of areas in this router is 2. 2 normal 0 stub 0 nssa
External flood list length 0
Number of interfaces in this area is 2
Area has no authentication
SPF algorithm executed 4 times
Area ranges are
Number of LSA 4. Checksum Sum 0x29BEB
Number of opaque link LSA 0. Checksum Sum 0x0
Number of DCbitless LSA 3 Number of indication LSA 0
Number of DoNotAge LSA 0 Flood list length 0
Q88. What does a nonzero forwarding address indicate in a type-5 LSA?
A. It indicates that this link-state ID is eligible for ECMP.
B. It indicates that this router should have an OSPF neighbor relationship with the forwarding address before using this link-state ID.
C. It indicates that the receiving router must check that the next hop is reachable in its routing table before using this link-state ID.
D. It indicates that traffic can be directly routed to this next hop in shared segment scenarios where the external route source is directly connected.
The value of the forwarding address specified by the autonomous system boundary router (ASBR) can be either 0.0.0.0 or non-zero. The 0.0.0.0 address indicates that the originating router (the ASBR) is the next hop. The forwarding address is determined by these conditions:
. The forwarding address is set to 0.0.0.0 if the ASBR redistributes routes and OSPF is not enabled on the next hop interface for those routes.
. These conditions set the forwarding address field to a non-zero address: ASBR's next hop interface address falls under the network range specified in the router ospf command.
Q89. Refer to the exhibit.
While configuring AAA with a local database, users can log in via Telnet, but receive the message "error in authentication" when they try to go into enable mode. Which action can solve this problem?
A. Configure authorization to allow the enable command.
B. Use aaa authentication login default enable to allow authentication when using the enable command.
C. Verify whether an enable password has been configured.
D. Use aaa authentication enable default enable to allow authentication when using the enable command.
If a different enable password is configured, it will override the privilege level 15 of that user and force the existing password to be used for enable access.
Q90. Which two actions can you take to allow the greatest number of pertinent packets to be stored in the temporary buffer of Cisco IOS Embedded Packet Capture? (Choose two.)
A. Specify the sampling interval.
B. Specify the capture buffer type.
C. Specify a reflexive ACL.
D. Specify the minimum packet capture rate.
E. Specify the packet size.
F. Store the capture simultaneously onto an external memory card as the capture occurs.
Embedded Packet Capture (EPC) provides an embedded systems management facility that helps in tracing and troubleshooting packets. This feature allows network administrators to capture data packets flowing through, to, and from a Cisco device. The network administrator may define the capture buffer size and type (circular, or linear) and the maximum number of bytes of each packet to capture. The packet capture rate can be throttled using further administrative controls. For example, options allow for filtering the packets to be captured using an Access Control List and, optionally, further defined by specifying a maximum packet capture rate or by specifying a sampling interval.
To know more about the 400-101, click here.