A Complete Guide to 400 101 pdf

It is more faster and easier to pass the Cisco 400 101 vce exam by using Accurate Cisco CCIE Routing and Switching (v5.0) questuins and answers. Immediate access to the Down to date ccie 400 101 dumps Exam and find the same core area ccie 400 101 dumps questions with professionally verified answers, then PASS your exam with a high score now.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 400-101 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/400-101-exam-dumps.html

Q131. Which type of port would have root guard enabled on it? 

A. A root port 

B. An alternate port 

C. A blocked port 

D. A designated port 

Answer:

Explanation: 

The root guard feature provides a way to enforce the root bridge placement in the network. The root guard ensures that the port on which root guard is enabled is the designated port. Normally, root bridge ports are all designated ports, unless two or more ports of the root bridge are connected together. If the bridge receives superior STP Bridge Protocol Data Units (BPDUs) on a root guard-enabled port, root guard moves this port to a root-inconsistent STP state. This root-inconsistent state is effectively equal to a listening state. No traffic is forwarded across this port. In this way, the root guard enforces the position of the root bridge. 

Reference: http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/10588-74.html 


Q132. Which two statements about the command distance bgp 90 60 120 are true? (Choose two.) 

A. Implementing the command is a Cisco best practice. 

B. The external distance it sets is preferred over the internal distance. 

C. The internal distance it sets is preferred over the external distance. 

D. The local distance it sets may conflict with the EIGRP administrative distance. 

E. The internal distance it sets may conflict with the EIGRP administrative distance. 

F. The local distance it sets may conflict with the RIP administrative distance. 

Answer: C,F 

Explanation: 

To allow the use of external, internal, and local administrative distances that could be a better route than other external, internal, or local routes to a node, use the distance bgp command in address family or router configuration mode. To return to the default values, use the no form of this command. distance bgp external-distance internal-distance local-distance no distance bgp 

. Syntax Description 

external-distance 

Administrative distance for BGP external routes. External routes are routes for which the best path is learned from a neighbor external to the autonomous system. Accept table values are from 1 to 255. The default is 20. Routes with a distance of 255 are not installed in the routing table. 

internal-distance 

Administrative distance for BGP internal routes. Internal routes are those routes that are learned from another BGP entity within the same autonomous system. Accept table values are from 1 to 255. The default is 200. Routes with a distance of 255 are not installed in the routing table. 

local-distance 

Administrative distance for BGP local routes. Local routes are those networks listed with a network router configuration command, often as back doors, for that router or for networks that are being redistributed from another process. Accept table values are from 1 to 255. The default is 200. Routes with a distance of 255 are not installed in the routing table. 

Defaults 

external-distance: 20 

internal-distance: 200 

local-distance: 200 

In this case, the internal distance is 60 and the external is 90, and the local distance is 120 (same as RIP). 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/iproute/command/reference/fiprrp_r/1rfbgp1. html#wp1113874 


Q133. Refer to the exhibit. 

Which three statements about the output are true? (Choose three.) 

A. This switch is currently receiving a multicast data stream that is being forwarded out VLAN 150. 

B. A multicast receiver has requested to join one or more of the multicast groups. 

C. Group 224.0.1.40 is a reserved address, and it should not be used for multicast user data transfer. 

D. One or more multicast groups are operating in PIM dense mode. 

E. One or more of the multicast data streams will be forwarded out to neighbor 10.85.20.20. 

F. Group 239.192.1.1 is a reserved address, and it should not be used for multicast user data transfer. 

Answer: A,B,C 

Explanation: 

A. VLAN 150 shows up in the outgoing interface list so those specific multicast streams are being forwarded to this VLAN. 

B. A receiver has requested to receive the multicast stream associated with the multicast address of 239.192.1.1, that is why this stream appears in the mroute table. 

C. The 224.0.1.40 is a reserved multicast group for cisco's Rp descovery. All cisco routers are members of this grup by default and listen to this group for Cisco RP discovery messages advertised by mapping agent even if it is not configured 


Q134. Which three condition types can be monitored by crypto conditional debug? (Choose three.) 

A. Peer hostname 

B. SSL 

C. ISAKMP 

D. Flow ID 

E. IPsec 

F. Connection ID 

Answer: A,D,F 

Explanation: 

Supported Condition Types 

The new crypto conditional debug CLIs--debug crypto condition, debug crypto condition unmatched, and show crypto debug-condition--allow you to specify conditions (filter values) in which to generate and display debug messages related only to the specified conditions. The table below lists the supported condition types. 

Table 1 Supported Condition Types for Crypto Debug CLI 

Condition Type (Keyword) 

Description 

connid 1 

An integer between 1-32766. Relevant debug messages will be shown if the current IPSec operation uses this value as the connection ID to interface with the crypto engine. 

flowid 1 

An integer between 1-32766. Relevant debug messages will be shown if the current IPSec operation uses this value as the flow-ID to interface with the crypto engine. 

FVRF 

The name string of a virtual private network (VPN) routing and forwarding (VRF) instance. Relevant debug messages will be shown if the current IPSec operation uses this VRF instance as its front-door VRF (FVRF). 

IVRF 

The name string of a VRF instance. Relevant debug messages will be shown if the current IPSec operation uses this VRF instance as its inside VRF (IVRF). 

peer group 

A Unity group-name string. Relevant debug messages will be shown if the peer is using this group name as its identity. 

peer hostname 

A fully qualified domain name (FQDN) string. Relevant debug messages will be shown if the peer is using this string as its identity; for example, if the peer is enabling IKE Xauth with this FQDN string. 

peeripaddress 

A single IP address. Relevant debug messages will be shown if the current IPSec operation is related to the IP address of this peer. 

peer subnet 

A subnet and a subnet mask that specify a range of peer IP addresses. Relevant debug messages will be shown if the IP address of the current IPSec peer falls into the specified subnet range. 

peer username 

A username string. Relevant debug messages will be shown if the peer is using this username as its identity; for example, if the peer is enabling IKE Extended Authentication (Xauth) with this username. 

SPI 1 

A 32-bit unsigned integer. Relevant debug messages will be shown if the current IPSec operation uses this value as the SPI. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnips/configuration/xe-3s/sec-sec-for-vpns-w-ipsec-xe-3s-book/sec-crypto-debug-sup.html 


Q135. DRAG DROP 

Drag each IS-IS command on the left to its effect on the right. 

Answer: 


Q136. Which two statements about IBGP multipath are true? (Choose two.) 

A. The IGP metric of the BGP next hop can be different from the best-path IGP metric if you configure the router for unequal-cost IBGP multipath. 

B. The IGP metric of the BGP next hop must be the same as the best-path IGP metric. 

C. The equivalent next-hop-self is performed on the best path from among the IBGP multipaths before it is forwarded to external peers. 

D. The path should be learned from an external neighbor. 

E. The router BGP process must learn the path from a confederation-external or external neighbor. 

F. The router BGP process must learn the path from an internal neighbor. 

Answer: A,F 


Q137. What can PfR passive monitoring mode measure for TCP flows? 

A. only delay 

B. delay and packet loss 

C. delay and reachability 

D. delay, packet loss, and throughput 

E. delay, packet loss, throughput, and reachability 

Answer:

Explanation: 

Passive monitoring metrics include the following: 

. Delay: Cisco PfR measures the average delay of TCP flows for a given prefix or traffic class. Delay is the measurement of the round-trip response time (RTT) between the transmission of a TCP synchronization message and receipt of the TCP acknowledgement. 

. Packet loss: Cisco PfR measures packet loss by tracking TCP sequence numbers for each TCP flow; it tracks the highest TCP sequence number. If it receives a subsequent packet with a lower sequence number, PfR increments the packet-loss counter. Packet 

loss is measured in packets per million. 

. Reachability: Cisco PfR measures reachability by tracking TCP synchronization messages that have been sent repeatedly without receiving a TCP acknowledgement. 

. Throughput: Cisco PfR measures TCP throughput by measuring the total number of bytes and packets for each interesting traffic class or prefix for a given interval of time. 

Reference: http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/performance-routing-pfr/product_data_sheet0900aecd806c4ee4.html 


Q138. Which two statements about MPLS VPNs are true? (Choose two.) 

A. PE routers maintain customer routes in the VPN for that customer. 

B. They use the explicit-null label by default. 

C. P routers are used only for label transit. 

D. P routers maintain customer routes in the VPN for that customer. 

E. They support only one route target. 

F. Each interface on a PE router must have its own VRF. 

Answer: A,C 


Q139. Which two packet types does an RTP session consist of? (Choose two.) 

A. TCP 

B. RTCP 

C. RTP 

D. ICMP 

E. BOOTP 

F. ARP 

Answer: B,C 

Explanation: 

An RTP session is established for each multimedia stream. A session consists of an IP address with a pair of ports for RTP and RTCP. For example, audio and video streams use separate RTP sessions, enabling a receiver to deselect a particular stream. The ports which form a session are negotiated using other protocols such as RTSP (using SDP in the setup method) and SIP. According to the specification, an RTP port should be even and the RTCP port is the next higher odd port number. 

Reference: http://en.wikipedia.org/wiki/Real-time_Transport_Protocol 


Q140. Which regular expression will match prefixes from the AS 200 that is directly connected to our AS? 

A. ^$ 

B. ^200) 

C. _200$ 

D. _200_ 

E. ^200_ 

Answer:

Explanation: 

Table 2 

Commonly Used Regular Expressions 

Expression 

Meaning 

Anything 

^$ 

Locally originated routes 

^100_ 

Learned from autonomous system 100 

_100$ 

Originated in autonomous system 100 

_100_ 

Any instance of autonomous system 100 

^[0-9]+$ 

Directly connected autonomous system paths 

Reference: 

http://www.cisco.com/c/en/us/td/docs/ios/termserv/configuration/guide/12_4t/tsv_12_4t_bo ok/tsv_reg_express.html