What Avant-garde 400-101 Is?

Pass4sure.com offers you everything you should prepare for that Cisco 400-101 actual exam. The particular Cisco 400-101 practice questions and answers are usually researched and developed by our specialized IT professionals. Pass4sures Cisco Cisco exam demos will help you obtain certified as well as save your current time and money. All of us provide a discounted price with regard to all the Cisco exam merchandise. So begin right aside and get the particular Cisco certification as quickly as achievable.

2021 Mar 400-101 free draindumps

Q1. Which ICMP message type is used to assist path MTU discovery? 

A. destination unreachable 

B. redirect message 

C. source quench 

D. time exceeded 

Answer:


Q2. Refer to the exhibit. 

At which location will the benefit of this configuration be observed? 

A. on Router A and its upstream routers B. on Router A and its downstream routers 

C. on Router A only 

D. on Router A and all of its ARP neighbors 

Answer:

Explanation: 

The following example shows how to configure the router (and downstream routers) to drop all options packets that enter the network: Router(config)# ip options drop 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/sel_drop.html 


Q3. Which option describes how a VTPv3 device responds when it detects a VTPv2 device on a trunk port? 

A. It sends VTPv3 packets only. 

B. It sends VTPv2 packets only. 

C. It sends VTPv3 and VTPv2 packets. 

D. It sends a special packet that contains VTPv3 and VTPv2 packet information. 

Answer:

Explanation: 

When a VTP version 3 device on a trunk port receives messages from a VTP version 2 device, the VTP version 3 device sends a scaled-down version of the VLAN database on that particular trunk in a VTP version 2 format. A VTP version 3 device does not send out VTP version 2-formatted packets on a trunk port unless it first receives VTP version 2 packets on that trunk. If the VTP version 3 device does not receive VTP version 2 packets for an interval of time on the trunk port, the VTP version 3 device stops transmitting VTP version 2 packets on that trunk port. Even when a VTP version 3 device detects a VTP version 2 device on a trunk port, the VTP version 3 device continues to send VTP version 3 packets in addition to VTP version 3 device 2 packets, to allow two kinds of neighbors to coexist on the trunk. VTP version 3 sends VTP version 3 and VTP version 2 updates on VTP version 2-detected trunks. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/vtp.html 


Q4. You are configuring a DMVPN hub to perform CBWFQ on a per-spoke basis. Which information is used to identify the spoke? 

A. the NHRP network ID 

B. the spoke tunnel source IP 

C. the spoke tunnel interface IP address 

D. the NHRP group 

Answer:


Q5. Refer to the exhibit. 

Which statement is true? 

A. There is no issue with forwarding IPv6 traffic from this router. 

B. IPv6 traffic can be forwarded from this router, but only on Ethernet1/0. 

C. IPv6 unicast routing is not enabled on this router. 

D. Some IPv6 traffic will be blackholed from this router. 

Answer:

Explanation: 

Here we see that the IPV6 default route shows two different paths to take, one via Ethernet 1/0 and one via Ethernet 0/0. However, only Eth 1/0 shows a next hop IPV6 address (the link local IPV6 address). There is no link local next hop addressed known on Eth 0/0. Therefore, traffic to all destinations will be load balanced over the two paths, but only half of the IPv6 traffic will be sent to the correct upstream router. 


Renewal 400-101 exam guide:

Q6. What is the preferred method to improve neighbor loss detection in EIGRP? 

A. EIGRP natively detects neighbor down immediately, and no additional feature or configuration is required. 

B. BFD should be used on interfaces that support it for rapid neighbor loss detection. 

C. Fast hellos (subsecond) are preferred for EIGRP, so that it learns rapidly through its own mechanisms. 

D. Fast hellos (one-second hellos) are preferred for EIGRP, so that it learns rapidly through its own mechanisms. 

Answer:

Explanation: 

Bi-directional Forwarding Detection (BFD) provides rapid failure detection times between forwarding engines, while maintaining low overhead. It also provides a single, standardized method of link/device/protocol failure detection at any protocol layer and over any media. 

Reference: “Bidirectional Forwarding Detection for EIGRP” 

http://www.cisco.com/en/US/technologies/tk648/tk365/tk207/technologies_white_paper090 0aecd80243fe7.html 


Q7. Refer to the exhibit. 

What is wrong with the configuration of this tunnel interface? 

A. ISATAP tunnels cannot use the EUI-64 address format. 

B. No tunnel destination has been specified. 

C. The tunnel source of an ISATAP tunnel must always point to a loopback interface. 

D. Router advertisements are disabled on this tunnel interface. 

Answer:

Explanation: 

Sending of IPv6 router advertisements is disabled by default on tunnel interfaces. This command reenables the sending of IPv6 router advertisements to allow client autoconfiguration: 

Example: Router(config-if)# no ipv6 nd ra suppress 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/interface/configuration/xe-3s/ir-xe-3s-book/ip6-isatap-xe.html 


Q8. Which three statements about GET VPN are true? (Choose three.) 

A. It encrypts WAN traffic to increase data security and provide transport authentication. 

B. It provides direct communication between sites, which reduces latency and jitter. 

C. It can secure IP multicast, unicast, and broadcast group traffic. 

D. It uses a centralized key server for membership control. 

E. It enables the router to configure tunnels. 

F. It maintains full-mesh connectivity for IP networks. 

Answer: A,B,D 

Explanation: 

Cisco GET VPN Features and Benefits 

Feature 

Description and Benefit 

Key Services 

Key Servers are responsible for ensuring that keys are granted to authenticated and authorized devices only. They maintain the freshness of the key material, pushing re-key messages as well as security policies on a regular basis. The chief characteristics include: 

. Key Servers can be located centrally, granting easy control over membership. 

. Key Servers are not in the "line of fire" - encrypted application traffic flows directly between VPN end points without a bottleneck or an additional point of failure. 

. Supports both local and global policies, applicable to all members in a group - such as "Permit any any", a policy to encrypt all traffic. 

. Supports IP Multicast to distribute and manage keys, for improved efficiency; Unicast is also supported where IP Multicast is not possible. 

Scalability and Throughput 

. The full mesh nature of the solution allows devices to communicate directly with each other, without requiring transport through a central hub; this minimizes extra encrypts and decrypts at the hub router; it also helps minimize latency and jitter. 

. Efficient handling of IP Multicast traffic by using the core network for replication can boost effective throughput further 

Security 

Provides data security and transport authentication, helping to meet security compliance and internal regulation by encrypting all WAN traffic 

Reference: http://www.cisco.com/c/en/us/products/collateral/security/group-encrypted-transport-vpn/product_data_sheet0900aecd80582067.html 


Q9. Which address is a MAC address that is mapped from an IPv6 address (RFC 2464)? 

A. 3333.FF17.FC0F 

B. FFFE. FF17.FC0F 

C. FF34.3333.FF17 

D. FF7E.FF17.FC0F 

Answer:

Explanation: 

An IPv6 packet with a multicast destination address DST, consisting of the sixteen octets DST through DST, is transmitted to the Ethernet multicast address whose first two octets are the value 3333 hexadecimal and whose last four octets are the last four octets of DST. 

Reference: https://tools.ietf.org/html/rfc2464 


Q10. DRAG DROP 

Drag and drop the Cisco IOX XE subpackage on the left to the function it performs on the right. 

Answer: 



see more 400-101 dumps