It is more faster and easier to pass the Cisco 400-101 exam by using 100% Correct Cisco CCIE Routing and Switching (v5.0) questuins and answers. Immediate access to the Renovate 400-101 Exam and find the same core area 400-101 questions with professionally verified answers, then PASS your exam with a high score now.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Cisco 400-101 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/400-101-exam-dumps.html
2021 Mar 400-101 exam fees
Q261. What are two benefits of NVI? (Choose two.)
A. It provides scalability by maintaining a NAT table on every interface.
B. It can dynamically create a static route to the NAT pool for translation.
C. It supports the use of route maps for policy-based NAT.
D. It supports the use of a single interface for translations.
E. It injects a route into the existing routing protocol that directs translation to the NAT pool.
Answer: A,B
Q262. Which BGP feature allows BGP routing tables to be refreshed without impacting established BGP sessions?
A. BGP synchronization
B. soft reconfiguration
C. confederations
D. hard reset
Answer: B
Explanation:
Clearing a BGP session using a hard reset invalidates the cache and results in a negative impact on the operation of networks as the information in the cache becomes unavailable. Soft reset is recommended because it allows routing tables to be reconfigured and activated without clearing the BGP session. Soft reset is done on a per-neighbor basis.
Reference: http://www.cisco.com/en/US/products/ps6599/products_data_sheet09186a0080087b3a.ht ml
Q263. Refer to the exhibit.
What is wrong with the configuration of the tunnel interface of this DMVPN Phase II spoke router?
A. The interface MTU is too high.
B. The tunnel destination is missing.
C. The NHRP NHS IP address is wrong.
D. The tunnel mode is wrong.
Answer: D
Explanation:
By default, tunnel interfaces use GRE as the tunnel mode, but a DMVPN router needs to be configured for GRE multipoint by using the “tunnel mode gre multipoint” interface command.
Q264. You are implementing new addressing with EIGRP routing and must use secondary addresses, which are missing from the routing table. Which action is the most efficient solution to the problem?
A. Disable split-horizon on the interfaces with secondary addresses.
B. Disable split-horizon inside the EIGRP process on the router with the secondary interface addresses.
C. Add additional router interfaces and move the secondary addresses to the new interfaces.
D. Use a different routing protocol and redistribute the routes between EIGRP and the new protocol.
Answer: A
Explanation:
Normally, routers that are connected to broadcast-type IP networks and that use distance-vector routing protocols employ the split horizon mechanism to reduce the possibility of routing loops. Split horizon blocks information about routes from being advertised by a router out of any interface from which that information originated. This behavior usually optimizes communications among multiple routers, particularly when links are broken. However, with nonbroadcast networks, situations can arise for which this behavior is less than ideal. For these situations, you might want to disable split horizon with EIGRP and RIP. If an interface is configured with secondary IP addresses and split horizon is enabled, updates might not be sourced by every secondary address. One routing update is sourced per network number unless split horizon is disabled.
Reference:
http://www.cisco.com/c/en/us/td/docs/ios/12_2/ip/configuration/guide/fipr_c/1cfrip.html
Q265. What is a cause for unicast flooding?
A. Unicast flooding occurs when multicast traffic arrives on a Layer 2 switch that has directly connected multicast receivers.
B. When PIM snooping is not enabled, unicast flooding occurs on the switch that interconnects the PIM-enabled routers.
C. A man-in-the-middle attack can cause the ARP cache of an end host to have the wrong MAC address. Instead of having the MAC address of the default gateway, it has a MAC address of the man-in-the-middle. This causes all traffic to be unicast flooded through the man-in-the-middle, which can then sniff all packets.
D. Forwarding table overflow prevents new MAC addresses from being learned, and packets destined to those MAC addresses are flooded until space becomes available in the forwarding table.
Answer: D
Explanation:
Causes of Flooding The very cause of flooding is that destination MAC address of the packet is not in the L2 forwarding table of the switch. In this case the packet will be flooded out of all forwarding ports in its VLAN (except the port it was received on). Below case studies display most common reasons for destination MAC address not being known to the switch.
Cause 1: Asymmetric Routing
Large amounts of flooded traffic might saturate low-bandwidth links causing network performance issues or complete connectivity outage to devices connected across such low-bandwidth links
Cause 2: Spanning-Tree Protocol Topology Changes
Another common issue caused by flooding is Spanning-Tree Protocol (STP) Topology Change Notification (TCN). TCN is designed to correct forwarding tables after the forwarding topology has changed. This is necessary to avoid a connectivity outage, as after a topology change some destinations previously accessible via particular ports might become accessible via different ports. TCN operates by shortening the forwarding table aging time, such that if the address is not relearned, it will age out and flooding will occur
Cause 3: Forwarding Table Overflow
Another possible cause of flooding can be overflow of the switch forwarding table. In this case, new addresses cannot be learned and packets destined to such addresses are flooded until some space becomes available in the forwarding table. New addresses will then be learned. This is possible but rare, since most modern switches have large enough forwarding tables to accommodate MAC addresses for most designs.
Reference:
http://www.cisco.com/c/en/us/support/docs/switches/catalyst-6000-series-switches/23563-143.html
Refresh 400-101 rapidshare:
Q266. What is the ip dhcp snooping information option command used for?
A. It displays information about the DHCP snooping table.
B. It sends a syslog and an SNMP trap for a DHCP snooping violation.
C. It enables the DHCP snooping host tracking feature.
D. It enables DHCP option 82 data insertion.
Answer: D
Explanation:
To enable DHCP option-82 data insertion, perform this task:
Command
Purpose
Step 1
Router(config)# ip dhcp snooping information option
Enables DHCP option-82 data insertion.
Step 2
Router(config)# ip dhcp snooping information option replace
Or:
Router(config-if)# ip dhcp snooping information option replace
(Optional) Replaces the DHCP relay information option received in snooped packets with the switch's option-82 data.
Step 3
Router(config)# do show ip dhcp snooping | include 82
Verifies
Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/snoodhcp.html
Q267. Refer to the exhibit.
What is the polling frequency set by this configuration?
A. 60 seconds
B. 10 seconds
C. 360 seconds
D. 60 milliseconds
E. 10 milliseconds
Answer: A
Explanation:
The frequency value lists the polling interval, in seconds.
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipsla/configuration/15-mt/sla-15-mt-book/sla_icmp_echo.html
Q268. Refer to the exhibit. The Main1 and Branch1 switches are connected directly over an MPLS pseudowire, and both run UDLD. After router B1 reloads because of a power failure, the pseudowire is restored. However, the Branch1 switch is unable to reach the Main1 switch.
Which two actions can you take to restore connectivity and prevent the problem from recurring? (Choose two.)
A. Configure a backup pseudowire between the Main1 and Branch1 switches.
B. Enable UDLD recovery on both the Main1 and Branch1 switches.
C. Configure a backup GRE tunnel between the Main1 and Branch1 switches.
D. Enable errdisable recovery on both the Main1 and Branch1 switches.
E. Issue the shutdown and no shutdown commands on both the Branch1 switch’s uplink to the B1 router and the Main1 switch’s uplink to the M1 router.
F. Issue the shutdown and no shutdown commands on the Branch1 switch uplink to the B1 router only.
Answer: D,F
Q269. While troubleshooting an issue for a remote user, you must capture the communication between the user's computer and a server at your location. The traffic passes through a Cisco IOS-XE capable switch. Which statement about obtaining the capture is true?
A. The Embedded Packet Capture application in the IOS-XE Software can capture the packets, but there is a performance impact.
B. The Embedded Packet Capture application in the IOS-XE Software can capture the packets without impacting performance.
C. The Mini Protocol Analyzer embedded in the IOS-XE Software can capture the packets without impacting performance.
D. The Mini Protocol Analyzer embedded in the IOS-XE Software can be used to capture the packets, but there is a performance impact.
E. Wireshark can capture packets through a SPAN port, but there is a performance impact.
Answer: A
Q270. Which three TLVs does LLDP use to discover network devices? (Choose three.)
A. Management address
B. Port description
C. Network policy
D. System name
E. Location information
F. Power management
Answer: A,B,D
Explanation:
Basic Management TLV Set
This set includes the following five TLVs used in LLDP:
. Port description TLV: Provides a description of the port in an alpha-numeric format. The value equals the ifDescr object, if the LAN device supports RFC 2863.
. System name TLV: Provides the system's assigned name in an alpha-numeric format. The value equals the sysName object, if the LAN device supports RFC 3418.
. System description TLV: Provides a description of the network entity in an alpha-numeric format. This includes system's name and versions of hardware, operating system and networking software supported in the device. The value equals the sysDescr object, if the LAN device supports RFC 3418.
. System capabilities TLV: Indicates the primary function(s) of the device and whether or not these functions are enabled in the device. The capabilities are indicated by two octects. Bits 0 through 7 indicate Other, Repeater, Bridge, WLAN AP, Router, Telephone, DOCSIS cable device and Station respectively. Bits 8 through 15 are reserved.
. Management address TLV: Indicates the addresses of the local LLDP agent. Other remote managers can use this address to obtain information related to the local device.
Reference: http://www.eetimes.com/document.asp?doc_id=1272069
