400 101 ccie (121 to 130)

Act now and download your Cisco 400 101 dumps test today! Do not waste time for the worthless Cisco passleader 400 101 tutorials. Download Up to the minute Cisco CCIE Routing and Switching (v5.0) exam with real questions and answers and begin to learn Cisco 400 101 pdf with a classic professional.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 400-101 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/400-101-exam-dumps.html

Q121. Which three features are common to OSPF and IS-IS? (Choose three.) 

A. They both maintain a link-state database from which a Dijkstra-based SPF algorithm computes a shortest path tree. 

B. They both use DR and BDR in the broadcast network. 

C. They both use hello packets to form and maintain adjacencies. 

D. They both use NSSA and stub type areas to scale the network design. 

E. They both have areas to form a two-level hierarchical topology. 

Answer: A,C,E 


Q122. Which problem can result when private AS numbers are included in advertisements that are sent to the global Internet BGP table? 

A. The prefixes sent with private AS numbers are always discarded on the Internet. 

B. The prefixes sent with private AS numbers are always tagged as invalid on the Internet. 

C. The prefixes sent with private AS numbers lack uniqueness, which can lead to a loss of connectivity. 

D. The prefixes sent with private AS numbers are sometimes tagged as invalid on the Internet. 

Answer:

Explanation: 

Private AS numbers are not meant to be used for global Internet BGP routing, as they are assigned locally and can be used by any organization. They are meant to enable BGP within a enterprise or VPN, but since these numbers can be used by any organization they are not unique and could cause connectivity loss if leaked to the Internet. 


Q123. Which action does route poisoning take that serves as a loop-prevention method? 

A. It immediately sends routing updates with an unreachable metric to all devices. 

B. It immediately sends routing updates with a metric of 255 to all devices. 

C. It prohibits a router from advertising back onto the interface from which it was learned. 

D. It advertises a route with an unreachable metric back onto the interface from which it was learned. 

E. It poisons the route by tagging it uniquely within the network. 

Answer:

Explanation: 

With route poisoning, when a router detects that one of its connected routes has failed, the router will poison the route by assigning an infinite metric to it and advertising it to neighbors. 


Q124. Refer to the exhibit. 

Which statement is true? 

A. This is an MPLS TE point-to-multipoint LSP in an MPLS network. 

B. This is an MPLS TE multipoint-to-point LSP in an MPLS network. 

C. This is a point-to-multipoint LSP in an MPLS network. 

D. This is a multipoint-to-multipoint LSP in an MPLS network. 

Answer:

Explanation: 

Same example of this provided on slide 24 at the reference link below: 

Reference: “mVPN Deployment Models” Cisco Live Presentation 

http://d2zmdbbm9feqrf.cloudfront.net/2014/eur/pdf/BRKIPM-2011.pdf, slide 24 


Q125. Refer to the exhibit. 

Routers R1 and R2 are configured as shown, and traffic from R1 fails to reach host 209.165.201.254. 

Which action can you take to correct the problem? 

A. Ensure that R2 has a default route in its routing table. 

B. Change the OSPF area type on R1 and R2. 

C. Edit the router configurations so that address 209.165.201.254 is a routable address. 

D. Remove the default-information originate command from the OSPF configuration of R2. 

Answer:

Explanation: 

Not sure that any of these answers are correct, it appears that this configuration is valid for reaching that one specific host IP. Answer A does have a route to that host so it would not need a default route to get to it. Choice B is incorrect as the area types have nothing to do with this. C is incorrect as that IP address is routable, and D is needed so that R1 will have a default route advertised to it from R2 so that it can reach this destination. 


Q126. DRAG DROP 

Drag each AF class on the left to its matching DSCP binary value on the right. 

Answer: 


Q127. Refer to the exhibit. 

What will be the IP MTU of tunnel 0? 

A. 1500 

B. 1524 

C. 1476 

D. 1452 

E. 1548 

Answer:

Explanation: 

In the case of the GRE tunnel interface, the IP maximum transmission unit (MTU) is 24 bytes less than the IP MTU of the real outgoing interface. For an Ethernet outgoing interface that means the IP MTU on the tunnel interface would be 1500 minus 24, or 1476 bytes. 

Reference: A spoke site that is connected to Router-A cannot reach a spoke site that is connected to Router-B, but both spoke sites can reach the hub. What is the likely cause of this issue http://www.cisco.com/c/en/us/support/docs/ip/generic-routing-encapsulation-gre/13725-56.html 


Q128. Which two statements are true about OTV? (Choose two.) 

A. It relies on flooding to propagate MAC address reachability information. 

B. It uses a full mesh of point-to-multipoint tunnels to prevent head-end replication of multicast traffic. 

C. It can work over any transport that can forward IP packets. 

D. It supports automatic detection of multihoming. 

Answer: C,D 

Explanation: 

The overlay nature of OTV allows it to work over any transport as long as this transport can forward IP packets. Any optimizations performed for IP in the transport will benefit the OTV encapsulated traffic. As part of the OTV control protocol, automatic detection of multihoming is included. This feature enables the multihoming of sites without requiring additional configuration or protocols 

Reference: http://www.cisco.com/c/en/us/products/collateral/switches/nexus-7000-series-switches/white_paper_c11-574984.html 


Q129. Which two statements about a network running MPLS VPN with IS-IS IGP are true? (Choose two.) 

A. IS-IS traffic engineering uses wide metric TLV type 135 with an up/down bit to define a leaked route. 

B. IS-IS traffic engineering uses wide metric TLV type 128 with an internal/external bit and an up/down bit to define a leaked route. 

C. IS-IS traffic engineering uses wide metric TLV type 130 with an internal/external bit and an up/down bit to define a leaked route. 

D. If the IS-IS up/down bit is set to 1, the leaked route originated in the L1 area. 

E. The MPLS VPN IS-IS core is inherently protected against IP-based attacks. 

Answer: A,E 


Q130. DRAG DROP 

Drag and drop each EIGRP element on the left to the corresponding definition on the right. 

Answer: