400-101 Guide

400-101 Exam Royal Pack (In Stock.)

  • Cisco
  • Exam Number/Code 400-101
  • Product Name CCIE Routing and Switching (v5.0)
  • Questions and Answers
  • 911 Q&As
  • Last Updated
  • Jun 18,2018
  • List Price
  • $128.99
  • Price
  • Today 49.99 USD

Free TrialVersion: demo Buy Now 50% OFF

10 Tips For 400-101 IT professionals

Never the provider can offer you you the guarantee that you will definitely get through the Cisco 400-101 exam. And in no way a provider could offer you so many forms of certification exam products. It will enable you not just pass the exam nevertheless also enhance your current ability and skills and enrich your understanding. These are extremely useful throughout the practical work. Download the free sample questions and check the idea by yourself before purchasing and then create a your choice. If you have got no notion about the Cisco 400-101 exam products and dont know how to get ready for your exam, the experts can give you a number of tips and advice. And also the Cisco Cisco exam study guidebook will also give you the systematic outline. They are shown in the form of chapter. Every chapter conclude the main details at the initial page. You should master the essential words and make full use of the study guidebook.

2017 Apr 400-101 practice

Q381. A TCP/IP host is able to transmit small amounts of data (typically less than 1500 bytes), but attempts to transmit larger amounts of data hang and then time out. What is the cause of this problem? 

A. A link is flapping between two intermediate devices. 

B. The processor of an intermediate router is averaging 90 percent utilization. 

C. A port on the switch that is connected to the TCP/IP host is duplicating traffic and sending it to a port that has a sniffer attached. 

D. There is a PMTUD failure in the network path. 



Sometimes, over some IP paths, a TCP/IP node can send small amounts of data (typically less than 1500 bytes) with no difficulty, but transmission attempts with larger amounts of data hang, then time out. Often this is observed as a unidirectional problem in that large data transfers succeed in one direction but fail in the other direction. This problem is likely caused by the TCP MSS value, PMTUD failure, different LAN media types, or defective links. 

Reference: http://www.cisco.com/c/en/us/support/docs/additional-legacy-protocols/ms-windows-networking/13709-38.html 

Q382. Which two options are ways in which an OSPFv3 router handles hello packets with a clear address-family bit? (Choose two.) 

A. IPv4 unicast packets are discarded. 

B. IPv6 unicast packets are discarded. 

C. IPv4 unicast packets are forwarded. 

D. IPv6 unicast packets are forwarded. 

Answer: A,D 


A typical distance vector protocol saves the following information when computing the best path to a destination: the distance (total metric or distance, such as hop count) and the vector (the next hop). For instance, all the routers in the network in Figure 1 are running Routing Information Protocol (RIP). Router Two chooses the path to Network A by examining the hop count through each available path. 

Since the path through Router Three is three hops, and the path through Router One is two hops, Router Two chooses the path through One and discards the information it learned through Three. If the path between Router One and Network A goes down, Router Two loses all connectivity with this destination until it times out the route of its routing table (three update periods, or 90 seconds), and Router Three re-advertises the route (which occurs every 30 seconds in RIP). Not including any hold-down time, it will take between 90 and 120 seconds for Router Two to switch the path from Router One to Router Three. EIGRP, instead of counting on full periodic updates to re-converge, builds a topology table from each of its neighbor's advertisements (rather than discarding the data), and converges by either looking for a likely loop-free route in the topology table, or, if it knows of no other route, by querying its neighbors. Router Two saves the information it received from both Routers One and Three. It chooses the path through One as its best path (the successor) and the path through Three as a loop-free path (a feasible successor). When the path through Router One becomes unavailable, Router Two examines its topology table and, finding a feasible successor, begins using the path through Three immediately. 

Reference: http://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/16406-eigrp-toc.html 


Drag and drop Layer 2 QoS Commands on the left to the corresponding functions on the right. 


Q384. Which two metrics are measured with active probes when PfR voice traffic optimization is in use? (Choose two.) 


B. cost 

C. jitter 

D. bandwidth 

Answer: A,C 

Q385. Which two services are used to transport Layer 2 frames across a packet-switched network? (Choose two.) 

A. Frame Relay 


C. AToM 

D. L2TPv3 

Answer: C,D 


Both AToM and L2TPv3 have the common objective of transmitting packet switched traffic of L2 frames (Frame Relay, ATM, and Ethernet) across a packet-switched network. 

Reference: Layer 2 VPN Architectures - Google Books Result Wei Luo, Carlos Pignataro, Anthony Chan 


Down to date 400-101 dumps:

Q386. Which two statements about the protected ports feature and the private VLAN feature are true? (Choose two.) 

A. The protected ports feature is limited to the local switch. 

B. The protected ports feature can isolate traffic between two "protected" ports on different switches. 

C. The private VLAN feature is limited to the local switch. 

D. The private VLAN feature prevents interhost communication within a VLAN across one or more switches. 

Answer: A,D 


Protected Ports (PVLAN Edge) In some network environments, there is a requirement for no traffic to be seen or forwarded between host(s) on the same LAN segment, thereby preventing interhost communications. The PVLAN edge feature provisions this isolation by creating a firewall-like barrier, thereby blocking any unicast, broadcast, or multicast traffic among the protected ports on the switch. Note that the significance of the protected port feature is limited to the local switch, and there is no provision in the PVLAN edge feature to isolate traffic between two "protected" ports located on different switches. For this purpose, the PVLAN feature can be used. 

Reference: http://www.ciscopress.com/articles/article.asp?p=1181682&seqNum=2 

Q387. Which two statements about IBGP multipath are true? (Choose two.) 

A. The IGP metric of the BGP next hop can be different from the best-path IGP metric if you configure the router for unequal-cost IBGP multipath. 

B. The IGP metric of the BGP next hop must be the same as the best-path IGP metric. 

C. The equivalent next-hop-self is performed on the best path from among the IBGP multipaths before it is forwarded to external peers. 

D. The path should be learned from an external neighbor. 

E. The router BGP process must learn the path from a confederation-external or external neighbor. 

F. The router BGP process must learn the path from an internal neighbor. 

Answer: A,F 

Q388. Refer to the exhibit. 

Which part of the joined group addresses list indicates that the interface has joined the EIGRP multicast group address? 

A. FF02::1 

B. FF02::1:FF00:200 

C. FF02::A 

D. FF02::2 



FF02::A is an IPv6 link-local scope multicast addresses. This address is for all devices on a wire that want to "talk" EIGRP with one another. 

Focusing specifically on FF02::A and how routers join it, we can see and say three things: 

. Local: FF02::A is local to the wire. 

. Join: Each device "joins" FF02::A by just "deciding to listen" to the IPv6 link-local scope multicast address FF02::A. Then, by extension, it listens to the corresponding MAC address for that multicast IPv6 address (33:33:00:00:00:0A). 

. Common interest: As we can see, these varying groups have something in common that they would all like to hear about. For FF02::A, the common interest --the "connection" among the devices joining that group – is that they all want to listen to or participate in EIGRP. 

Reference: http://www.networkcomputing.com/networking/understanding-ipv6-what-is-solicited-node-multicast/a/d-id/1315703 

Q389. Refer to the exhibit. 

Which statement about this GETVPN configuration is true? 

A. Co-operative key servers are configured. 

B. Redundant peers are configured. 

C. The key server uses multicast mode to propagate rekey messages. 

D. PSK authentication is configured. 



Drag and drop the multicast protocol definition on the left to the correct default time interval on the right. 


To know more about the 400-101, click here.

Tagged as : Cisco 400-101 Dumps, Download 400-101 pdf, 400-101 VCE, 400-101 pass4sure, examcollection 400-101