Proper study guides for Leading Cisco CCIE Routing and Switching (v5.0) certified begins with Cisco 400 101 dumps preparation products which designed to deliver the Download ccie 400 101 questions by making you pass the ccie 400 101 test at your first time. Try the free 400 101 ccie demo right now.
Q201. Which three protocols can use enhanced object tracking? (Choose three.)
The Enhanced Object Tracking feature separates the tracking mechanism from HSRP and creates a separate standalone tracking process that can be used by other processes and HSRP. This feature allows tracking of other objects in addition to the interface line-protocol state. A client process such as HSRP, Virtual Router Redundancy Protocol (VRRP), or Gateway Load Balancing Protocol (GLBP), can register its interest in tracking objects and then be notified when the tracked object changes state.
Q202. DRAG DROP
Drag and drop the OSPF network type on the left to the correct category of timers on the right.
Q203. DRAG DROP
Drag and drop the argument of the ip cef load-sharing algorithm command on the left to the function it performs on the right.
Q204. Which BGP feature prevents a router from installing an iBGP learned route in its routing table until the route is validated within the IGP?
Q205. Which two options are disadvantages of a commingled dual-tier WAN rate-based Ethernet circuit? (Choose two.)
A. It requires the maintenance of separate chassis.
B. It has limited scalability.
C. It requires additional CPU resources at the subscriber end.
D. It is more difficult to secure.
E. It can increase the likelihood of packet drops.
Q206. Which VPN technology requires the use of an external key server?
E. IPsec F. L2TPv3
A GETVPN deployment has primarily three components, Key Server (KS), Group Member (GM), and Group Domain of Interpretation (GDOI) protocol. GMs do encrypt/decrypt the traffic and KS distribute the encryption key to all the group members. The KS decides on one single data encryption key for a given life time. Since all GMs use the same key, any GM can decrypt the traffic encrypted by any other GM. GDOI protocol is used between the GM and KS for group key and group SA management. Minimum one KS is required for a GETVPN deployment.
Q207. Refer to the exhibit.
Which statement about the device routing table is true?
A. Only networks 10.10.10.0/24 and smaller from host 192.168.168.1 are in the routing table.
B. Only networks 10.10.10.0/24 and larger from host 192.168.168.1 are in the routing table.
C. Only network 10.10.10.0/24 from host 192.168.168.1 is in the routing table.
D. Networks 10.10.10.0/24 and smaller from any host are in the routing table.
When you add the keywords “GE” and “LE” to the prefix-list, the “len” value changes its meaning. When using GE and LE, the len value specifies how many bits of the prefix you are checking, starting with the most significant bit. ip prefix-list LIST permit 126.96.36.199/24 le 32
This means: Check the first 24 bits of the prefix 188.8.131.52 The subnet mask must be less than or equal to 32
Q208. Which three statements about IS-IS are true? (Choose three.)
A. IS-IS is not encapsulated in IP.
B. IS-IS is directly encapsulated in the data link layer.
C. 0XFEFE is used in the Layer 2 header to identify the Layer 3 protocol.
D. IS-IS uses protocol ID 93.
E. IS-IS can be used to route the IPX protocol.
F. IS-IS is an IETF standard.
IS-IS is an Interior Gateway Protocol (IGP) for routing OSI. IS-IS packets are not encapsulated in CLNS or IP but are encapsulated directly in the data-link layer. The IS-IS protocol family is OSI, and values such as 0xFE and 0xFEFE are used by the data-link protocol to identify the Layer 3 protocol as OSI.
Reference: http://www.cisco.com/en/US/products/ps6599/products_white_paper09186a00800a3e6f.sh tml
Q209. Which technology facilitates neighbor IP address resolution in DMVPN?
C. a dynamic routing protocol
NHRP Used with a DMVPN
NHRP is used to facilitate building a VPN and provides address resolution in DMVPN. In this context, a VPN consists of a virtual Layer 3 network that is built on top of an actual Layer 3 network. The topology you use over the VPN is largely independent of the underlying network, and the protocols you run over it are completely independent of it. The VPN network (DMVPN) is based on GRE IP logical tunnels that can be protected by adding in IPsec to encrypt the GRE IP tunnels.
Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_4/ip_addr/configuration/guide/hadnhrp.html#w p1057255
Q210. Which attribute is not part of the BGP extended community when a PE creates a VPN-IPv4 route while running OSPF between PE-CE?
A. OSPF domain identifier
B. OSPF route type
C. OSPF router ID
E. OSPF network type
By process of elimination, from RFC 4577:
For every address prefix that was installed in the VRF by one of its associated OSPF instances, the PE must create a VPN-IPv4 route in BGP. Each such route will have some of the following Extended Communities attributes:
– The OSPF Domain Identifier Extended Communities attribute. If the OSPF instance that installed the route has a non-NULL primary Domain Identifier, this MUST be present; if that OSPF instance has only a NULL Domain Identifier, it MAY be omitted.
– OSPF Route Type Extended Communities Attribute. This attribute MUST be present. It is encoded with a two-byte type field, and its type is 0306.
– OSPF Router ID Extended Communities Attribute. This OPTIONAL attribute specifies the OSPF Router ID of the system that is identified in the BGP Next Hop attribute. More precisely, it specifies the OSPF Router Id of the PE in the OSPF instance that installed the route into the VRF from which this route was exported.
– MED (Multi_EXIT_DISC attribute). By default, this SHOULD be set to the value of the OSPF distance associated with the route, plus 1.
To know more about the 400-101, click here.