Proper study guides for Replace Cisco CCIE Routing and Switching (v5.0) certified begins with Cisco ccie 400 101 preparation products which designed to deliver the Realistic 400 101 vce questions by making you pass the ccie 400 101 dumps test at your first time. Try the free cisco 400 101 demo right now.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Cisco 400-101 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/400-101-exam-dumps.html
Q91. What is a reason to use DHCPv6 on a network that uses SLAAC?
A. To get a record of the IPs that are used by the clients
B. To push DNS and other information to the clients
C. No reason, because there is no need for DHCPv6 when using SLAAC
D. Because DHCPv6 can be used only in stateful mode with SLAAC to record the IPs of the clients
E. Because DHCPv6 can be used only in stateless mode with SLAAC to record the IPs of the clients
F. Because DHCPv6 is required to use first-hop security features on the switches
Answer: B
Explanation:
SLAAC is by far the easiest way to configure IPv6 addresses, simply because you don’t have to configure any IPv6 address. With SLAAC, a host uses the IPv6 Neighbor Discovery Protocol (NDP) to determine its IP address and default routers. Using SLAAC, a host requests and listens for Router Advertisements (RA) messages, and then taking the prefix that is advertised to form a unique address that can be used on the network. For this to work, the prefix that is advertised must advertise a prefix length of 64 bits (i.e., /64). But the most significant of Stateless Address Autoconfiguration (SLAAC) is it provided no mechanism for configuring DNS resolver information.Therefore SLACC can be used along with DHCPv6 (Stateless) to push DNS and other information to the clients.
Q92. Refer to the exhibit.
Which statement is true?
A. There is an MPLS network that is running 6PE, and the ingress PE router has no mpls ip propagate-ttl.
B. There is an MPLS network that is running 6VPE, and the ingress PE router has no mpls ip propagate-ttl.
C. There is an MPLS network that is running 6PE or 6VPE, and the ingress PE router has mpls ip propagate-ttl.
D. There is an MPLS network that is running 6PE, and the ingress PE router has mpls ip propagate-ttl.
E. There is an MPLS network that is running 6VPE, and the ingress PE router has mpls ip propagate-ttl.
Answer: C
Explanation:
The second hop shows and IPV6 address over MPLS, so we know that there is an MPLS network running 6PE or 6VPE. And because the second and third hops show up in the traceroute. Then TTL is being propagated because if the “no ip propagate-ttl” command was used these devices would be hidden in the traceroute.
Q93. Two routers are trying to establish an OSPFv3 adjacency over an Ethernet link, but the adjacency is not forming. Which two options are possible reasons that prevent OSPFv3 to form between these two routers? (Choose two.)
A. mismatch of subnet masks
B. mismatch of network types
C. mismatch of authentication types
D. mismatch of instance IDs
E. mismatch of area types
Answer: D,E
Explanation:
An OSPFv3 interface must have a compatible configuration with a remote interface before the two can be considered neighbors. The two OSPFv3 interfaces must match the following criteria:
. Hello interval
. Dead interval
. Area ID
. Optional capabilities
The OSPFv3 header includes an instance ID field to identify that OSPFv3 packet for a particular OSPFv3 instance. You can assign the OSPFv3 instance. The interface drops all OSPFv3 packets that do not have a matching OSPFv3 instance ID in the packet header.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx-os/unicast/configuration/guide/l3_cli_nxos/l3_ospfv3.html
Q94. Which two statements about VRRP are true? (Choose two.)
A. It is assigned multicast address 224.0.0.18.
B. The TTL for VRRP packets must be 255.
C. It is assigned multicast address 224.0.0.9.
D. Its IP protocol number is 115.
E. Three versions of the VRRP protocol have been defined.
F. It supports both MD5 and SHA1 authentication.
Answer: A,B
Q95. How many address families can a single OSPFv3 instance support?
A. 1
B. 2
C. 5
D. 10
Answer: A
Q96. Which two methods can you use to limit the range for EIGRP queries? (Choose two.)
A. Use an access list to deny the multicast address 224.0.0.1 outbound from select EIGRP neighbor and permit everything else.
B. Configure route tagging for all EIGRP routes.
C. Summarize routes at the boundary routers of the EIGRP domain.
D. Configure unicast EIGRP on all routers in the EIGRP domain.
E. Configure stub routers in the EIGRP domain.
F. Use an access list to deny the multicast address 224.0.0.10 outbound from select EIGRP neighbors and permit everything else.
Answer: C,E
Q97. You are configuring a DHCPv6 client for a DHCPv6 server with the prefix delegation feature. Which option is a result of the interface configuration when you enter the command ipv6 address autoconfig default?
A. a static IPv6 default route pointing to the upstream DHCP server
B. a static IPv6 default route pointing to the upstream DHCP relay
C. a static IPv6 default route pointing to the upstream router
D. a temporary stateless address, formed from the EUI-64 bit address and the prefix from the route advertisement of the upstream router
Answer: A
Q98. Which IPv6 tunneling mechanism requires a service provider to use one of its own native IPv6 blocks to guarantee that its IPv6 hosts will be reachable?
A. 6rd tunneling
B. automatic 6to4 tunneling
C. NAT-PT tunneling
D. ISATAP tunneling
E. manual ipv6ip tunneling
F. automatic 4to6 tunneling
Answer: A
Q99. Which option describes the purpose of the leak-map keyword in the command eigrp stub connected leak-map EigrpLeak?
A. It allows the specified static routes to be advertised.
B. It allows exceptions to the route summarization that is configured.
C. It allows specified EIGRP-learned routes to be advertised.
D. It restricts specified connected routes from being advertised.
Answer: C
Explanation:
ExamplE. eigrp stub leak-map Command
In the following example, the eigrp stub command is issued with the leak-map name keyword-argument pair to configure the device to reference a leak map that identifies routes to be advertised that would have been suppressed otherwisE.
Device(config)# router eigrp 1
Device(config-router)# network 10.0.0.0
Device(config-router)# eigrp stub leak-map map1
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_eigrp/configuration/15-mt/ire-15-mt-book/ire-eigrp-stub-rtg.html#GUID-FB899CA9-E9DE-48D8-8048-C971179E4E24
Q100. Which multicast protocol uses source trees and RPF?
A. DVMRP
B. PIM sparse mode
C. CBT
D. mOSPF
Answer: A
Explanation:
DVMRP builds a parent-child database using a constrained multicast model to build a forwarding tree rooted at the source of the multicast packets. Multicast packets are initially flooded down this source tree. If redundant paths are on the source tree, packets are not forwarded along those paths. Forwarding occurs until prune messages are received on those parent-child links, which further constrains the broadcast of multicast packets.
Reference: DVMRP and dense-mode PIM use only source trees and use RPF as previously described.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3550/software/release/12-1_19_ea1/configuration/guide/3550scg/swmcast.html
