What tells you about cisco 400 101

Testking offers free demo for ccie 400 101 dumps exam. "CCIE Routing and Switching (v5.0)", also known as 400 101 pdf exam, is a Cisco Certification. This set of posts, Passing the Cisco 400 101 pdf exam, will help you answer those questions. The 400 101 pdf Questions & Answers covers all the knowledge points of the real exam. 100% real Cisco 400 101 dumps exams and revised by experts!


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 400-101 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/400-101-exam-dumps.html

Q201. What is the most efficient way to confirm whether microbursts of traffic are occurring? 

A. Monitor the output traffic rate using the show interface command. 

B. Monitor the output traffic rate using the show controllers command. 

C. Check the CPU utilization of the router. 

D. Sniff the traffic and plot the packet rate over time. 

Answer:

Explanation: 

Micro-bursting is a phenomenon where rapid bursts of data packets are sent in quick succession, leading to periods of full line-rate transmission that can overflow packet buffers of the network stack, both in network endpoints and routers and switches inside the network. In order to troubleshoot microbursts, you need a packet sniffer that can capture traffic over a long period of time and allow you to analyze it in the form of a graph which displays the saturation points (packet rate during microbursts versus total available bandwidth). You can eventually trace it to the source causing the bursts (e.g. stock trading applications). 

Reference: Adam, Paul (2014-07-12). All-in-One CCIE V5 Written Exam Guide (Kindle Locations 989-994). Kindle Edition. 


Q202. DRAG DROP 

Drag and drop the argument of the ip cef load-sharing algorithm command on the left to the function it performs on the right. 

Answer: 


Q203. Which three statements about implementing an application layer gateway in a network are true? (Choose three.) 

A. It allows client applications to use dynamic ports to communicate with a server regardless of whether NAT is being used. 

B. It maintains granular security over application-specific data. 

C. It allows synchronization between multiple streams of data between two hosts. 

D. Application layer gateway is used only in VoIP/SIP deployments. 

E. Client applications require additional configuration to use an application layer gateway. 

F. An application layer gateway inspects only the first 64 bytes of a packet before forwarding it through the network. 

Answer: A,B,C 

Explanation: 

An ALG may offer the following functions: 

. allowing client applications to use dynamic ephemeral TCP/ UDP ports to communicate with the known ports used by the server applications, even though a firewall configuration may allow only a limited number of known ports. In the absence of an ALG, either the ports would get blocked or the network administrator would need to explicitly open up a large number of ports in the firewall — rendering the network vulnerable to attacks on those ports. 

. converting the network layer address information found inside an application payload between the addresses acceptable by the hosts on either side of the firewall/NAT. This aspect introduces the term 'gateway' for an ALG. 

. recognizing application-specific commands and offering granular security controls over them 

. synchronizing between multiple streams/sessions of data between two hosts exchanging data. For example, an FTP application may use separate connections for passing control commands and for exchanging data between the client and a remote server. During large file transfers, the control connection may remain idle. An ALG can prevent the control connection getting timed out by network devices before the lengthy file transfer completes. 

Reference: http://en.wikipedia.org/wiki/Application-level_gateway 


Q204. Which two statements about LDP advertising when Explicit Null is in effect are true? (Choose two.) 

A. Penultimate hop popping is disabled. 

B. Penultimate hop popping is enabled. 

C. It is the default behavior for LDP. 

D. It is used for the advertisement of static routes. 

E. It is used for the advertisement of connected routes. 

Answer: A,E 


Q205. What is the hop limit for an MLD message? 

A. 1 

B. 2 

C. 15 

D. 255 

Answer:

Explanation: 

MLD uses the Internet Control Message Protocol (ICMP) to carry its messages. All MLD messages are link-local with a hop limit of 1, and they all have the alert option set. The alert option implies an implementation of the hop-by-hop option header. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipmulti_lsm/configuration/xe-3s/imc-lsm-xe-3s-book/ipv6-mcast-mld-xe.html 


Q206. Refer to the exhibit. 

Which two statements about the R1 configuration are true? (Choose two.) 

A. The IP TTL value is copied to the MPLS field during label imposition. 

B. The structure of the MLPS network is hidden in a traceroute. 

C. The LDP session interval and hold times are configured for directly connected neighbors. 

D. R1 protects the session for 86400 seconds. 

E. All locally assigned labels are discarded. 

Answer: B,D 


Q207. Refer to the exhibit. 

Which two statements are true? (Choose two.) 

A. This is the output of the show ip ospf command. 

B. This is the output of the show ip protocols command. 

C. This router is an ABR. 

D. This router is an ASBR. 

E. Authentication is not configured for the area. 

Answer: A,E 

Explanation: 

The following is sample output from the show ip ospf command when entered without a specific OSPF process ID with no authentication. 

Router# show ip ospf 

Routing Process "ospf 201" with ID 10.0.0.1 and Domain ID 10.20.0.1 

Supports only single TOS(TOS0) routes 

Supports opaque LSA 

SPF schedule delay 5 secs, Hold time between two SPFs 10 secs 

Minimum LSA interval 5 secs. Minimum LSA arrival 1 secs 

LSA group pacing timer 100 secs 

Interface flood pacing timer 55 msecs 

Retransmission pacing timer 100 msecs 

Number of external LSA 0. Checksum Sum 0x0 

Number of opaque AS LSA 0. Checksum Sum 0x0 

Number of DCbitless external and opaque AS LSA 0 

Number of DoNotAge external and opaque AS LSA 0 

Number of areas in this router is 2. 2 normal 0 stub 0 nssa 

External flood list length 0 

Area BACKBONE(0) 

Number of interfaces in this area is 2 

Area has no authentication 

SPF algorithm executed 4 times 

Area ranges are 

Number of LSA 4. Checksum Sum 0x29BEB 

Number of opaque link LSA 0. Checksum Sum 0x0 

Number of DCbitless LSA 3 Number of indication LSA 0 

Number of DoNotAge LSA 0 Flood list length 0 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_ospf/command/iro-cr-book/ospf-s1.html#wp8749965360 


Q208. Which three types of traffic are allowed by IEEE 802.1X access control prior to getting authenticated? (Choose three.) 

A. EAPOL 

B. VTP 

C. STP 

D. ARP 

E. CDP 

F. HTTP 

Answer: A,C,E 

Explanation: 

Until the client is authenticated, IEEE 802.1x access control allows only Extensible Authentication Protocol over LAN (EAPOL), Cisco Discovery Protocol (CDP), and Spanning Tree Protocol (STP) traffic through the port to which the client is connected. After authentication, normal traffic passes through the port. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750/software/release/15-0_2_se/configuration/guide/scg3750/sw8021x.pdf 


Q209. Which EIGRP configuration results in subsecond failover outside of the basic routing 

protocol convergence? 

A. bfd all-interfaces 

B. timers active-time disabled 

C. timers active-time 1 

D. timers nsf route-hold 20 

Answer:


Q210. Refer to the exhibit. 

If the network switch is configured as shown, which two statements about network traffic are true? (Choose two.) 

A. Traffic enters the shaper on a FIFO basis. 

B. Traffic enters the shaper on a weighted fair queueing basis. 

C. Drop behavior is random for traffic in excess of 6 Mbps. 

D. Voice traffic is given priority until it reaches 1.5 Mbps. 

E. Voice traffic is given priority until it reaches 6 Mbps. 

Answer: A,D 

Explanation: 

A. Serial interfaces at E1 (2.048 Mbps) and below use weighted fair queueing (WFQ) by default. Other interfaces use first-in first-out (FIFO) by default. 

D. Voice traffic is given priority up to 25% of the shape average value, which is 6000000, so 25% of 6 Mbps is 1.5 Mbps.