Tips for passleader 400 101


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 400-101 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/400-101-exam-dumps.html

Q251. Which two BGP path attributes are visible in Wireshark? (Choose two.) 

A. weight 

B. AS path 

C. local preference 

D. route maps 

Answer: B,C 


Q252. DRAG DROP 

Drag and drop the EIGRP query condition on the left to the corresponding action taken by the router on the right. 

Answer: 


Q253. Refer to the exhibit. 

Which type of BGP peer is 192.168.1.1? 

A. route reflector client 

B. iBGP 

C. confederation 

D. VPNv4 

Answer:


Q254. Refer to the exhibit. 

Which statement about the topology is true? 

A. It provides a transparent LAN service. 

B. It provides only point-to-multipoint connections between UNIs. 

C. It uses port-based connections at the hub. 

D. It provides point-to-point connections between UNIs. 

Answer:


Q255. Which VPN technology requires the use of an external key server? 

A. GETVPN 

B. GDOI 

C. SSL 

D. DMVPN 

E. IPsec F. L2TPv3 

Answer:

Explanation: 

A GETVPN deployment has primarily three components, Key Server (KS), Group Member (GM), and Group Domain of Interpretation (GDOI) protocol. GMs do encrypt/decrypt the traffic and KS distribute the encryption key to all the group members. The KS decides on one single data encryption key for a given life time. Since all GMs use the same key, any GM can decrypt the traffic encrypted by any other GM. GDOI protocol is used between the GM and KS for group key and group SA management. Minimum one KS is required for a GETVPN deployment. 

Reference: http://www.cisco.com/c/en/us/products/collateral/security/group-encrypted-transport-vpn/deployment_guide_c07_554713.html 


Q256. Refer to the exhibit. 

While configuring AAA with a local database, users can log in via Telnet, but receive the message "error in authentication" when they try to go into enable mode. Which action can solve this problem? 

A. Configure authorization to allow the enable command. 

B. Use aaa authentication login default enable to allow authentication when using the enable command. 

C. Verify whether an enable password has been configured. 

D. Use aaa authentication enable default enable to allow authentication when using the enable command. 

Answer:

Explanation: 

If a different enable password is configured, it will override the privilege level 15 of that user and force the existing password to be used for enable access. 


Q257. Refer to the exhibit. 

Which two statements about the VPN solution are true? (Choose two.) 

A. Customer A and customer B will exchange routes with each other. 

B. R3 will advertise routes received from R1 to R2. 

C. Customer C will communicate with customer A and B. 

D. Communication between sites in VPN1 and VPN2 will be blocked. 

E. R1 and R2 will receive VPN routes advertised by R3. 

Answer: C,E 

Explanation: 

+ VPN1 exports 10:1 while VPN3 imports 10:1 so VPN3 can learn routes of VPN1. 

+ VNP1 imports 10:1 while VNP3 export 10:1 so VNP1 can learn routes of VPN3. 

-> Customer A can communicate with Customer C 

+ VPN2 exports 20:1 while VPN3 imports 20:1 so VPN3 can learn routes of VPN2. 

+ VPN2 imports 20:1 while VPN3 exports 20:1 so VPN2 can learn routes of VPN3. 

-> Customer B can communicate with Customer C 

Therefore answer C is correct. 

Also answer E is correct because R1 & R2 import R3 routes. 

Answer A is not correct because Customer A & Customer B do not import routes which are exported by other router. Customer A & B can only see Customer C. 

Answer B is not correct because a router never exports what it has learned through importation. It only exports its own routes. 

Answer D is correct because two VPN1 and VPN2 cannot see each other. Maybe in this question there are three correct answers. 


Q258. Which two metrics are measured with active probes when PfR voice traffic optimization is in use? (Choose two.) 

A. MOS 

B. cost 

C. jitter 

D. bandwidth 

Answer: A,C 


Q259. Which two statements about Inverse ARP are true? (Choose two.) 

A. It uses the same operation code as ARP. 

B. It uses the same packet format as ARP. 

C. It uses ARP stuffing. 

D. It supports static mapping. 

E. It translates Layer 2 addresses to Layer 3 addresses. 

F. It translates Layer 3 addresses to Layer 2 addresses. 

Answer: B,E 

Explanation: 

Inverse Address Resolution Protocol (Inverse ARP or InARP) is used to obtain Network Layer addresses (for example, IP addresses) of other nodes from Data Link Layer (Layer 2) addresses. It is primarily used in Frame Relay (DLCI) and ATM networks, in which Layer 2 addresses of virtual circuits are sometimes obtained from Layer 2 signaling, and the corresponding Layer 3 addresses must be available before those virtual circuits can be used. 

Since ARP translates Layer 3 addresses to Layer 2 addresses, InARP may be described as its inverse. In addition, InARP is implemented as a protocol extension to ARP: it uses the same packet format as ARP, but different operation codes. 

Reference: http://en.wikipedia.org/wiki/Address_Resolution_Protocol 


Q260. Refer to the exhibit. 

Which two statements about this configuration are true? (Choose two.) 

A. Pings from SW2 to SW1 fail because SW1 is pruning VLAN 10. 

B. VLANs 10 and 200 are added to the SW2 allowed list on interface fa0/22. 

C. Pings from SW2 to SW1 are successful. 

D. Only VLAN 200 is added to the SW1 allowed list on interface fa0/22. 

Answer: B,C