Cisco official certifications is usually acquiring a lot importance within it community day by day. Occasion has been evolving promptly. And therefore a lot of shifts are usually listed in every subject. It all subject is not really wonderful from other career fields. You have a will need to keep on being up-to-date with current information and informations to show your well worth in your pertinent subject. Cisco authenticates knowing, competencies, expertise and capacities. You possibly can show your reliability of do the job by simply acquiring official certifications.. This specific official certifications produces visible adjustments in this qualified competencies of IT qualified. Design your qualified career remarkable utilizing review 400-101.
Q411. Refer to the exhibit.
When the link between RtrB and RtrC goes down, multicast receivers stop receiving traffic from the source for multicast group 184.108.40.206.Which solution will resolve this?
A. adding a static mroute on RtrB and RtrF
B. adding a static unicast route on RtrB and RtrF
C. creating a GRE tunnel between RtrB and RtrD
D. enabling PIM sparse mode on both ends of the link between RtrB and RtrF
For multicast traffic to flow, PIM must be enabled on all routers in the path of the multicast stream.
Q412. In the DiffServ model, which class represents the lowest priority with the lowest drop probability?
Assured Forwarding (AF) Behavior Group
AF11 (DSCP 10)
AF21 (DSCP 18)
AF31 (DSCP 26)
AF41 (DSCP 34)
AF12 (DSCP 12)
AF22 (DSCP 20)
AF32 (DSCP 28)
AF42 (DSCP 36)
AF13 (DSCP 14)
AF23 (DSCP 22)
AF33 (DSCP 30)
AF43 (DSCP 38)
Q413. Which two pieces of information does RTCP use to inform endpoint devices about the RTP flow? (Choose two.)
A. the transmitted octet
B. the lost packet count
C. session control function provisioning information
D. the CNAME for session participants
E. the authentication method
F. MTU size changes in the path of the flow
RTCP transports statistics for a media connection and information such as transmitted octet and packet counts, packet loss, packet delay variation, and round-trip delay time. An application may use this information to control quality of service parameters, perhaps by limiting flow, or using a different codec.
Q414. Which variable in an EEM applet is set when you use the sync yes option?
The CLI event detector screens CLI commands for a regular expression match. When a match is found, an event is published. The match logic is performed on the fully expanded CLI command after the command is successfully parsed and before it is executed. The CLI event detector supports three publish modes:
. Synchronous publishing of CLI events--The CLI command is not executed until the EEM policy exits, and the EEM policy can control whether the command is executed. The read/write variable, _exit_status, allows you to set the exit status at policy exit for policies triggered from synchronous events. If _exit_status is 0, the command is skipped, if _exit_status is 1, the command is run.
. Asynchronous publishing of CLI events--The CLI event is published, and then the CLI command is executed.
. Asynchronous publishing of CLI events with command skipping--The CLI event is published, but the CLI command is not executed.
Q415. On an MPLS L3VPN, which two tasks are performed by the PE router? (Choose two.)
A. It exchanges VPNv4 routes with other PE routers.
B. It typically exchanges iBGP routing updates with the CE device.
C. It distributes labels and forwards labeled packets.
D. It exchanges VPNv4 routes with CE devices.
E. It forwards labeled packets between CE devices.
MPLS VPN functionality is enabled at the edge of an MPLS network. The PE router performs these tasks: .
Exchanges routing updates with the CE router .
Translates the CE routing information into VPN version 4 (VPNv4) routes .
Exchanges VPNv4 routes with other PE routers through the Multiprotocol Border Gateway Protocol (MP-BGP)
A PE router binds a label to each customer prefix learned from a CE router and includes the label in the network reachability information for the prefix that it advertises to other PE routers. When a PE router forwards a packet received from a CE router across the provider network, it labels the packet with the label learned from the destination PE router. When the destination PE router receives the labeled packet, it pops the label and uses it to direct the packet to the correct CE router. Label forwarding across the provider backbone is based on either dynamic label switching or traffic engineered paths. A customer data packet carries two levels of labels when traversing the backbone
Q416. While troubleshooting an issue for a remote user, you must capture the communication between the user's computer and a server at your location. The traffic passes through a Cisco IOS-XE capable switch. Which statement about obtaining the capture is true?
A. The Embedded Packet Capture application in the IOS-XE Software can capture the packets, but there is a performance impact.
B. The Embedded Packet Capture application in the IOS-XE Software can capture the packets without impacting performance.
C. The Mini Protocol Analyzer embedded in the IOS-XE Software can capture the packets without impacting performance.
D. The Mini Protocol Analyzer embedded in the IOS-XE Software can be used to capture the packets, but there is a performance impact.
E. Wireshark can capture packets through a SPAN port, but there is a performance impact.
Q417. Refer to the exhibit.
Which command is configured on this router?
A. bgp update-delay 60
B. neighbor 10.100.1.1 maximum-prefix 200
C. neighbor 10.100.1.1 maximum-path 2
D. neighbor 10.100.1.1 ebgp-multihop 2
The BGP Maximum-Prefix feature allows you to control how many prefixes can be received from a neighbor. By default, this feature allows a router to bring down a peer when the number of received prefixes from that peer exceeds the configured Maximum-Prefix limit. This feature is commonly used for external BGP peers, but can be applied to internal BGP peers also. When the maximum number of prefixes has been received, the BGP sessions closes into the IDLE state.
Q418. Which two statements about the function of the stub feature in EIGRP are true? (Choose two.)
A. It stops the stub router from sending queries to peers.
B. It stops the hub router from sending queries to the stub router.
C. It stops the stub router from propagating dynamically learned EIGRP prefixes to the hub routers.
D. It stops the hub router from propagating dynamically learned EIGRP prefixes to the stub routers.
When using the EIGRP Stub Routing feature, you need to configure the distribution and remote routers to use EIGRP, and to configure only the remote router as a stub. Only specified routes are propagated from the remote (stub) router. The router responds to queries for summaries, connected routes, redistributed static routes, external routes, and internal routes with the message "inaccessible." A router that is configured as a stub will send a special peer information packet to all neighboring routers to report its status as a stub router. Without the stub feature, even after the routes that are sent from the distribution router to the remote router have been filtered or summarized, a problem might occur. If a route is lost somewhere in the corporate network, EIGRP could send a query to the distribution router, which in turn will send a query to the remote router even if routes are being summarized. If there is a problem communicating over the WAN link between the distribution router and the remote router, an EIGRP stuck in active (SIA) condition could occur and cause instability elsewhere in the network. The EIGRP Stub Routing feature allows a network administrator to prevent queries from being sent to the remote router.
Q419. DRAG DROP
Drag and drop the TACACS+ configuration command on the left to the correct function it performs on the right.
Q420. Refer to the exhibit.
Which two options are possible states for the interface configured with the given OSPFv3
authentication? (Choose two.)
A. GOING UP
D. GOING DOWN
To configure IPsec, you configure a security policy, which is a combination of the security policy index (SPI) and the key (the key is used to create and validate the hash value). IPsec for OSPFv3 can be configured on an interface or on an OSPFv3 area. For higher security, you should configure a different policy on each interface configured with IPsec. If you configure IPsec for an OSPFv3 area, the policy is applied to all of the interfaces in that area, except for the interfaces that have IPsec configured directly. Once IPsec is configured for OSPFv3, IPsec is invisible to you. The secure socket API is used by applications to secure traffic. The API needs to allow the application to open, listen, and close secure sockets. The binding between the application and the secure socket layer also allows the secure socket layer to inform the application of changes to the socket, such as connection open and close events. The secure socket API is able to identify the socket; that is, it can identify the local and remote addresses, masks, ports, and protocol that carry the traffic requiring security. Each interface has a secure socket state, which can be one of the following:
. NULL: Do not create a secure socket for the interface if authentication is configured for the area.
. DOWN: IPsec has been configured for the interface (or the area that contains the interface), but OSPFv3 either has not requested IPsec to create a secure socket for this interface, or there is an error condition.
. GOING UP: OSPFv3 has requested a secure socket from IPsec and is waiting for a CRYPTO_SS_SOCKET_UP message from IPsec.
. UP: OSPFv3 has received a CRYPTO_SS_SOCKET_UP message from IPsec.
. CLOSING: The secure socket for the interface has been closed. A new socket may be opened for the interface, in which case the current secure socket makes the transition to the DOWN state. Otherwise, the interface will become UNCONFIGURED.
. UNCONFIGURED. Authentication is not configured on the interface.
OSPFv3 will not send or accept packets while in the DOWN state.
To know more about the 400-101, click here.