400-101 Guide

400-101 Exam Royal Pack (In Stock.)

 
  • Cisco
  • Exam Number/Code 400-101
  • Product Name CCIE Routing and Switching (v5.0)
  • Questions and Answers
  • 911 Q&As
  • Last Updated
  • Jun 18,2018
  • List Price
  • $128.99
  • Price
  • Today 49.99 USD

Free TrialVersion: demo Buy Now 50% OFF

What to do with 400 101 pdf

We provide real exam 400 101 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Cisco cisco 400 101 Exam quickly & easily. The cisco 400 101 PDF type is available for reading and printing. You can print more and practice many times. With the help of our Cisco exam 400 101 dumps pdf and vce product and material, you can easily pass the 400 101 dumps exam.

Q181. Which two statements about HSRP are true? (Choose two.) 

A. Its virtual MAC is 0000.0C07.Acxx. 

B. Its multicast virtual MAC is 0000.5E00.01xx. 

C. Its default configuration allows for pre-emption. 

D. It supports tracking. 

E. It supports unique virtual MAC addresses. 

Answer: A,D 

Explanation: 

Default HSRP Configuration 

Feature 

Default Setting 

HSRP version 

Version 1 

HSRP groups 

None configured 

Standby group number 

Standby MAC address 

System assigned as: 0000.0c07.acXX, where XX is the HSRP group number 

Standby priority 

100 

Standby delay 

0 (no delay) 

Standby track interface priority 

10 

Standby hello time 

3 seconds 

Standby holdtime 

10 seconds 

. The standby track interface configuration command ties the router hot standby priority to the availability of its interfaces and is useful for tracking interfaces that are not configured for HSRP. When a tracked interface fails, the hot standby priority on the device on which tracking has been configured decreases by 10. If an interface is not tracked, its state changes do not affect the hot standby priority of the configured device. For each interface configured for hot standby, you can configure a separate list of interfaces to be tracked. 

. The standby track interface-priority interface configuration command specifies how much to decrement the hot standby priority when a tracked interface goes down. When the interface comes back up, the priority is incremented by the same amount. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/1 2-2_55_se/configuration/guide/3750xscg/swhsrp.html 


Q182. Which option describes how a VTPv3 device responds when it detects a VTPv2 device on a trunk port? 

A. It sends VTPv3 packets only. 

B. It sends VTPv2 packets only. 

C. It sends VTPv3 and VTPv2 packets. 

D. It sends a special packet that contains VTPv3 and VTPv2 packet information. 

Answer:

Explanation: 

When a VTP version 3 device on a trunk port receives messages from a VTP version 2 device, the VTP version 3 device sends a scaled-down version of the VLAN database on that particular trunk in a VTP version 2 format. A VTP version 3 device does not send out VTP version 2-formatted packets on a trunk port unless it first receives VTP version 2 packets on that trunk. If the VTP version 3 device does not receive VTP version 2 packets for an interval of time on the trunk port, the VTP version 3 device stops transmitting VTP version 2 packets on that trunk port. Even when a VTP version 3 device detects a VTP version 2 device on a trunk port, the VTP version 3 device continues to send VTP version 3 packets in addition to VTP version 3 device 2 packets, to allow two kinds of neighbors to coexist on the trunk. VTP version 3 sends VTP version 3 and VTP version 2 updates on VTP version 2-detected trunks. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/vtp.html 


Q183. A configuration includes the line ip nbar port-map SSH tcp 22 23 443 8080. Which option describes the effect of this configuration line? 

A. It configures NBAR to search for SSH using ports 22, 23, 443, and 8080. 

B. It configures NBAR to allow SSH connections only on ports 22, 23, 443, and 8080. 

C. It enables NBAR to inspect for SSH connections. 

D. It creates a custom NBAR port-map named SSH and associates TCP ports 22, 23, 443, and 8080 to itself. 

Answer:

Explanation: 

The ip nbar-port-map command configures NBAR to search for a protocol or protocol name using a port number other than the well-known port. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/qos/command/reference/fqos_r/qrfcmd10.pd f 


Q184. Refer to the exhibit. 

Your organization has two offices, Site 1 and Site 2, which are connected by a provider 

backbone, as shown. Where must you configure an attachment circuit to allow the two sites to connect over a Layer 2 network using L2TPv3? 

A. PE Site 1 Fa1/0 and PE Site 2 Fa0/0 

B. CE Site 1 Fa0/0 and CE Site 2 Fa0/0 

C. PE Site 1 Se0/0 and PE Site 2 Se0/0 

D. CE Site 1 Fa0/0 and PE Site 2 Se0/0 

Answer:


Q185. Which statement about the OSPF Loop-Free Alternate feature is true? 

A. It is supported on routers that are configured with virtual links. 

B. It is supported in VRF OSPF instances. 

C. It is supported when a traffic engineering tunnel interface is protected. 

D. It is supported when traffic can be redirected to a primary neighbor. 

Answer:

Explanation: 

Restrictions for OSPF IPv4 Remote Loop-Free Alternate IP Fast Reroute 

. The OSPF IPv4 Remote Loop-Free Alternate IP Fast Reroute feature is not supported on devices that are virtual links headends. 

. The feature is supported only in global VPN routing and forwarding (VRF) OSPF 

Instances. 

. The only supported tunneling method is MPLS. 

. You cannot configure a traffic engineering (TE) tunnel interface as a protected interface. Use the MPLS Traffic Engineering—Fast Reroute Link and Node Protection feature to protect these tunnels. For more information, see the “MPLS Traffic Engineering—Fast Reroute Link and Node Protection” section in the Multiprotocol Label Switching Configuration Guide. 

. You can configure a TE tunnel interface in a repair path, but OSPF will not verify the tunnel’s placement; you must ensure that it is not crossing the physical interface that it is intended to protect. 

. Not all routes can have repair paths. Multipath primary routes might have repair paths for all, some, or no primary paths, depending on the network topology, the connectivity of the computing router, and the attributes required of repair paths. 

. Devices that can be selected as tunnel termination points must have a /32 address advertised in the area in which remote LFA is enabled. This address will be used as a tunnel termination IP. If the device does not advertise a /32 address, it may not be used for remote LFA tunnel termination. 

. All devices in the network that can be selected as tunnel termination points must be configured to accept targeted LDP sessions using the mpls ldp discovery targeted-hello accept command. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_ospf/configuration/xe-3s/iro-xe-3s-book/iro-ipfrr-lfa.html 


Q186. Which three types of address-family configurations are supported in EIGRP named mode? (Choose three.) 

A. address-family ipv4 unicast 

B. address-family vpnv4 

C. address-family ipv6 unicast 

D. address-family ipv6 multicast 

E. address-family vpnv6 

F. address-family ipv4 multicast 

Answer: A,C,F 


Q187. Which three statements are functions that are performed by IKE phase 1? (Choose three.) 

A. It builds a secure tunnel to negotiate IKE phase 1 parameters. 

B. It establishes IPsec security associations. 

C. It authenticates the identities of the IPsec peers. 

D. It protects the IKE exchange by negotiating a matching IKE SA policy. 

E. It protects the identities of IPsec peers. 

F. It negotiates IPsec SA parameters. 

Answer: C,D,E 

Explanation: 

The basic purpose of IKE phase 1 is to authenticate the IPSec peers and to set up a secure channel between the peers to enable IKE exchanges. IKE phase 1 performs the following functions: 

. Authenticates and protects the identities of the IPSec peers 

. Negotiates a matching IKE SA policy between peers to protect the IKE exchange 

. Performs an authenticated Diffie-Hellman exchange with the end result of having matching shared secret keys 

. Sets up a secure tunnel to negotiate IKE phase 2 parameters 

Reference: http://www.ciscopress.com/articles/article.asp?p=25474&seqNum=7


Q188. Which EIGRP packet types are sent as unicast packets? 

A. hello, update, query 

B. query, SIA query, reply 

C. SIA query, reply, ACK 

D. query, SIA query, SIA reply 

Answer:


Q189. Which two protocols are used to establish IPv6 connectivity over an MPLS network? (Choose two.) 

A. 6PE 

B. 6VPE 

C. RSVP 

D. ISATAP 

E. LDP 

F. IPv6IP 

Answer: A,B 


Q190. Which two statements about MLD are true? (Choose two.) 

A. MLD is a subprotocol of ICMPv6. 

B. When a single link supports multiple interfaces, only one interface is required to send MLD messages. 

C. MLD is a subprotocol of PIMv6. 

D. When a single link supports multiple interfaces, all supported interfaces are required to send MLD messages. 

E. There are three subtypes of MLD query messages. 

F. The code section in the MLD message is set to 1 by the sender and ignored by receivers. 

Answer: A,B 


To know more about the 400-101, click here.

Tagged as : Cisco 400-101 Dumps, Download 400-101 pdf, 400-101 VCE, 400-101 pass4sure, examcollection 400-101