Examples of 400-101 ccie routing and switching pdf

It is more faster and easier to pass the Cisco 400-101 exam by using Verified Cisco CCIE Routing and Switching (v5.0) questuins and answers. Immediate access to the Leading 400-101 Exam and find the same core area 400-101 questions with professionally verified answers, then PASS your exam with a high score now.

2016 Sep 400-101 ccie routing and switching pdf:

Q471. Which statement is true regarding the UDP checksum? 

A. It is used for congestion control. 

B. It cannot be all zeros. 

C. It is used by some Internet worms to hide their propagation. 

D. It is computed based on the IP pseudo-header. 

Answer: D 

Explanation: 

The method used to compute the checksum is defined in RFC 768: “Checksum is the 16-bit one's complement of the one's complement sum of a pseudo header of information from the IP header, the UDP header, and the data, padded with zero octets at the end (if necessary) to make a multiple of two octets.” In other words, all 16-bit words are summed using one's complement arithmetic. Add the 16-bit values up. Each time a carry-out (17th bit) is produced, swing that bit around and add it back into the least significant bit. The sum is then one's complemented to yield the value of the UDP checksum field. If the checksum calculation results in the value zero (all 16 bits 0) it should be sent as the one's complement (all 1s). 

Reference: http://en.wikipedia.org/wiki/User_Datagram_Protocol 


Q472. Which two statements about Cisco Performance Routing are true? (Choose two.) 

A. It analyzes application performance to make routing decisions. 

B. When determining the best path, it prefers the shortest path. 

C. It can help the administrator determine the need for bandwidth upgrades. 

D. It operates entirely in the data plane. 

E. It can use EIGRP feasible successors to determine an alternate path. 

F. It analyzes system hardware performance to make routing decisions. 

Answer: A,E 


Q473. An access switch at a remote location is connected to the spanning-tree root with redundant uplinks. A network engineer notices that there are issues with the physical cabling of the current root port. The engineer decides to force the secondary link to be the desired forwarding root port. Which action accomplishes this task? 

A. Adjust the secondary link to have a lower priority than the primary link. 

B. Change the link type to point-to-point. 

C. Apply a BPDU filter on the primary interface of the remote switches. 

D. Enable Rapid Spanning Tree to converge using the secondary link. 

Answer: A 


Q474. Which option is an incorrect design consideration when deploying OSPF areas? 

A. area 1 - area 0 - MPLS VPN backbone - area 0 - area 2 

B. area 1 - MPLS VPN backbone - area 2 

C. area 1 - MPLS VPN backbone - area 1 

D. area 2 - area 0 - MPLS VPN backbone - area 1 

E. area 0 - area 2 - MPLS VPN superbackbone - area 1 

Answer: E 

Explanation: 

In the case of MPLS-VPN Backbone as The OSPF superbackbone behaves exactly like Area 0 in regular OSPF, so we cannot have two different area 0’s that are not directly connected to each other. When area 0 connects to the superbackbone, it simply becomes an extension of area 0. 


Q475. DRAG DROP 

Drag and drop each GET VPN feature on the left to the corresponding function it performs on the right. 


Answer: 



400-101 free practice exam

Up to the minute ccie written exam:

Q476. Refer to the exhibit. 


RIPv2 authentication is failing on a device with this configuration. Which two actions can you take to enable it? (Choose two.) 

A. Set the RIP authentication mode to text. 

B. Set the RIP authentication mode to MD5. 

C. Configure the password encryption for the key. 

D. Set the password encryption to AES. 

Answer: A,B 

Explanation: 

See the reference link below for information on configuring RIPv2 authentication, including both test and MD5 modes. 

Reference: http://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol-rip/13719-50.html#configuringplain 


Q477. Refer to the exhibit. 


Which statement describes what the authoritative flag indicates? 

A. Authentication was used for the mapping. 

B. R1 learned about the NHRP mapping from a registration request. 

C. Duplicate mapping in the NHRP cache is prevented. 

D. The registration request had the same flag set. 

Answer: B 

Explanation: 

Show NHRP: Examples 

The following is sample output from the show ip nhrp command: 

Router# show ip nhrp 

10.0.0.2 255.255.255.255, tunnel 100 created 0:00:43 expire 1:59:16 

TypE. dynamic Flags: authoritative 

NBMA address: 10.1111.1111.1111.1111.1111.1111.1111.1111.1111.11 

10.0.0.1 255.255.255.255, Tunnel0 created 0:10:03 expire 1:49:56 

TypE. static Flags: authoritative 

The fields in the sample display are as follows: 

Flags: 

authoritative—Indicates that the NHRP information was obtained from the Next Hop Server or router that maintains the NBMA-to-IP address mapping for a particular destination. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_4/ip_addr/configuration/guide/hadnhrp.html 


Q478. When you enable the MPLS Multi-VRF feature, which two supported routing protocols can be used to exchange routing information between PE routers and CE routers? (Choose two.) 

A. BGP 

B. RIP 

C. OSPF 

D. EIGRP 

E. IS-IS 

Answer: A,B 


Q479. Which BGP aggregate address configuration advertises only the aggregate address, with attributes inherited from the more specific routes? 

A. summary-only as-set 

B. as-set 

C. summary 

D. summary-only 

Answer: A 

Explanation: 

Example: 

router bgp 300 

neighbor 2.2.2.2 remote-as 100 

neighbor 3.3.3.3 remote-as 200 

neighbor 4.4.4.4 remote-as 400 

aggregate-address 160.0.0.0 255.0.0.0 summary-only as-set 

!--- With the as-set configuration command, the aggregate 

!--- inherits the attributes of the more-specific routes. 

Reference: http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/5441-aggregation.html 


Q480. Which statement about VRRP is true? 

A. It supports load balancing. 

B. It can be configured with HSRP on a switch or switch stack. 

C. It supports IPv4 and IPv6. 

D. It supports encrypted authentication. 

Answer: B 

Explanation: 

VRRP Limitations 

. You can configure both HSRP and VRRP on a switch or switch stack. However, you cannot add a switch model that supports only one protocol to a stack that is configured for both protocols. 

. The VRRP implementation on the switch does not support the MIB specified in RFC 2787. 

. The VRRP implementation on the switch supports only text -based authentication. 

. The switch supports VRRP only for IPv4. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/1 2-2_58_se/configuration/guide/3750xscg/swhsrp.html#pgfId-1107127 



see more 400-101 dumps