180 likes | 191 Views
CertsGrade offers 400-101 Certification real exam questions answers with money back pass guarantee. Our professionals are certified in subjects certification exam material.<br>http://www.certsgrade.com/pdf/400-101/<br>
E N D
C E R T S GR A DE High Grade and Valuable Preparation Stuff High Grade and Valuable Preparation Stuff Cisco 400-101 CCIE Routing and Switching Written Exam v5.1 For More Information – Visit link below: http://www.certsgrade.com/ Version = Version = Product Visit us athttps://www.certsgrade.com/pdf/400-101/
Question: 1 DRAG DROP Drag and drop the BGP attribute on the left to the correct category on the right. Answer: Question: 2 DRAG DROP Drag and drop each IPv6 neighbor discovery message type on the left to the corresponding description on the right. Visit us athttps://www.certsgrade.com/pdf/400-101/
Answer: Question: 3 DRAG DROP Drag and drop the NAT operations on the left into the correct sequential order on the right. Answer: Visit us athttps://www.certsgrade.com/pdf/400-101/
Question: 4 Which type of port would have root guard enabled on it? A. a designated port B. an alternate port C. a blocked port D. a root port Answer: A Question: 5 Which statement about Cisco Express Forwarding is true? A. The FIB tables resides on the route processor and the adjacency table resides on the line cards when Cisco Express Forwarding is enabled. B. Layer 2 next-hop address information is maintained in the adjacency table. C. The FIB table and the adjacency table reside on the line cards when Cisco Express Forwarding is enabled. D. Layer 2 next-hop address information is maintained in the FIB table. Answer: A Question: 6 DRAG DROP Drag and drop each BGP attribute on the left into the priority order in which the attributes are preferred when determining the best path on the right. Visit us athttps://www.certsgrade.com/pdf/400-101/
Answer: Question: 7 Refer to the exhibit. Which two statements about the output aretrue?(Choose two) Visit us athttps://www.certsgrade.com/pdf/400-101/
A. BFD last failed 476ms ago on interface GigabitEthernet 0/3. B. BGP on RT1 has negotiated the BFD capability with its peer. C. BFD is active on interface GigabitEthernet0/3 and is using ICMP. D. BFD is active on interface GigabitEthernet0/3 and is using UDP. E. BFD is active for BGP on RT1 Answer: BE Question: 8 Which feature can you implement to most efficiently protect customer traffic in a rate-limited WAN Ethernet service ? A. IntServ with RSVP B. DiffServ C. Q-in-Q D. The IPsec VTI qos pre-classify command E. HCBWFQ Answer: B Visit us athttps://www.certsgrade.com/pdf/400-101/
Question: 9 Which statement is true about conditional advertisements? A. Conditional advertisements create routes when a predefined condition is met. B. Conditional advertisements create routes when a predefined condition is not met. C. Conditional advertisements delete routes when a predefined condition is met. D. Conditional advertisements create routes and withhold them until a predefined condition is met. E. Conditional advertisements do not create routes, they only withhold them until a predefined condition is met. Answer: E Question: 10 Which option describes how a router responds if LSA throttling is configured and it receives the identical LSA before the interval is set? A. The LSA is added to the OSPF database and a notification is sent to the sending router to slowdown its LSA packet updates. B. The LSA is added to the OSPF database. C. The LSA is ignored. D. The LSA is ignored and a notification is sent to the sending router to slow down its LSA packet Updates. Answer: C Question: 11 Which data plane protocol does EIGRP Over the Top use? A. GRE B. MPLS C. LISP D. IP-in-IP Answer: C Question: 12 Visit us athttps://www.certsgrade.com/pdf/400-101/
Refer to the exhibit. Which traffic gets set to AF41 by the marking policy on interface GigabitEthernet0/0? A. Only traffic matching access-list streaming B. No traffic gets set to AF41 C. Any traffic matching access-list tp-rooms and access-list streaming D. Only traffic matching access-list tp-rooms Answer: C Question: 13 DRAG DROP Drag each OSPFv2 SA parameter on the left to its corresponding description on the right. Visit us athttps://www.certsgrade.com/pdf/400-101/
Answer: Question: 14 Refer to the exhibit.What are two effects of the given configuration?(Choose two) Visit us athttps://www.certsgrade.com/pdf/400-101/
A. Track objiect 100 goes down if Ethernet1/0 goes down. B. The aggregate weight of track object 100 is set to 30. C. Track object 100 goes down if Ethernet1/2 goes down. D. The aggregate weight of track object 100 is set to 40. E. Track object 100 stays up as long as both Ethernet1/0 and Ethernet1/1 are up. F. Track object 100 goes down if all three interfaces go down. Answer: EF Question: 15 Which PIM mode can forward traffic by using only (*.G) routing table entries? A. Space-dese mode B. Bidirectional mode C. Deuce mode D. Sparse mode Answer: B Question: 16 Which TCP feature allows a client to request a specific packet that was lost? A. Selective acknowledge B. Flow control C. Fast recovery D. Sliding window Answer: A Visit us athttps://www.certsgrade.com/pdf/400-101/
Question: 17 Refer to the exhibit. You are configuring Router 1 and Routef2 for L2TPv3 tunneling.Which two additional configurations are required to enable Router 1 and Routei'2 to establish the tuimel?(choose two) A. Router 1 must be configured to encapsulate traffic by using L2TPv3 under the pseudowire-class RltoR2. B. An IP address must be confiaured on interface FastEthernet1/0 onRouter1. C. Loopback 0 on Router1 must be advertised to Router2. D. Cisco Express Fowarding must be disabled on Router1. E. Cisco Discovery Protocol must be enabled on interface FastEthernet1/0 onRouter1. Answer: AC Question: 18 Which TCP feature allows a client to request a specific packet that was lost? A. Flow control B. Sliding window Visit us athttps://www.certsgrade.com/pdf/400-101/
C. Fast recovery D. Selective acknowedgment Answer: D Question: 19 Refer to the exhibit. You are configuring Router1 and Router2 for L2TPv3 tunneling. Which two additional configurations are required to enable Router1 and Router2 to establish the tunnel?(choose two) A. Router1 must be configured to encapsulate traffic by using L2TPv3 under thepseudowire-class R1toR2. B. An IP address must be configured on interface FastEthernet1/0 on Router1. C. Loopback 0 on Router1 must be advertised to Router2. D. Cisco Express Fowarding must be disabled on Router1. E. Cisco Discovery Protocol must be enabled on interface FastEthernet1/0 on Router1. Answer: AC Question: 20 Which option is the origin code when a route is redistributed into BGP? A. IGP B. EGP C. External D. Incomplete Visit us athttps://www.certsgrade.com/pdf/400-101/
E. Unknown Answer: D Question: 21 When you deploy DMVPN,what is the purpose of the command crypto isakmp key ciscotest address 0.0.0.0 0.0.0.0? A. It is configured on the hub and spoke routers to establish peering. B. It is configured on the hub to sent the pre-shared key for the spoke routers C. It is configured on the Internet PE routers to allow traffic to traverse the ISP core D. It is configured on the spokes to indicate the hub router. Answer: B Question: 22 Refer to the exhibit. What conclusion can you draw from the given ping output? A. The ping operation sent packets ranging from 505 to 1500 bytes in size. B. Fragmentation failed during the ping operation. C. The packet life was exceeded in 5 percent of the operations. D. The Verbose option was set in the IP header. Answer: B Visit us athttps://www.certsgrade.com/pdf/400-101/
Question: 23 Which statement is true about trunking? A. DTP only supports autonegotiation on 802.1q and does not support autonegotiation for ISL B. Cisco switches that run PVST+ do not transmit BPDUS on nonnative VLANs when using a C. dot1q trunk. D. DTP os a point-to-point protocol. E. When removing VLAN 1 from a trunk,management traffic such as CDP is no longer passed in that VLAN. Answer: C Question: 24 Which command can you enter on an interface so that the interface will notify the sender of a packet that the path is sub-optimal? A. Ipnhrp cost 65535 B. Ipnhrp redirect C. Ipnhrp set-unique-bit D. Ipnhrp record E. Ipnhrp shortcut Answer: B Question: 25 Which technology can be used to prevent flooding of ipv6 multicast traffic on a switch? A. MLD filtering B. IGMP snooping C. MLD snooping D. IGMP filtering Answer: C Question: 26 Visit us athttps://www.certsgrade.com/pdf/400-101/
Which statement about a type 4 LSA in OSPF is true? A. It is an LSA that is originated by an ABR,that is flooded throughout the AS,and that describes a route to the ASBR. B. It is an LSA that is originated by an ABR,that is flooded throughout the AS,and that describes a route to the ABR. C. It is an LSA that is originated by an ASBR,that is flooded throughout the AS,and that describes a route to the ASBR. D. It is an LSA that is originated by an ABR,that is flooded throughout the area,and that describes a route to the ASBR. E. It is an LSA that is originated by an ASBR,that is flooded throughout the area,and that describes a route to the ASBR. Answer: D Question: 27 What is the main function of VRF-lite? A. To segreagate multiple routing tables on a single device. B. To connect different autonomous systems together to share routes. C. To allow device to use lables to make layer 2 path decisions. D. To route IPv6 traffic across an IPv4 backbone. Answer: A Question: 28 Refer to the exhibit. Visit us athttps://www.certsgrade.com/pdf/400-101/
Which kind of ICMPv6 packet is shownin the output? A. Neighbor advertisement B. Time exceeded C. Neighbor soliciation D. Router advertisement E. Router discovery Answer: C Question: 29 Which three factors does Cisco PFR use to calculate the best exit path?(Choose three) A. Reachability B. Delay C. Quality of service D. Packet size E. Adminstrative distance F. Loss Answer: ABF Question: 30 Which ISAKMP feature can protect a GDOI from a hacker using a network sniffer while a security association is established? Visit us athttps://www.certsgrade.com/pdf/400-101/
A. An ISAKMP phase 1 security association B. An ISAKMP phase 2 security association C. The Proof of Possession(POP) D. A ISAKMP phase 2 GROUPKEY-PUSH exchange E. An ISAKMP phase 2 GROUPKEY-PULL exchange Answer: A Visit us athttps://www.certsgrade.com/pdf/400-101/
For More Information – Visit link below: http://www.certsgrade.com/ PRODUCT FEATURES 100% Money Back Guarantee 90 Days Free updates Special Discounts on Bulk Orders Guaranteed Success 50,000 Satisfied Customers 100% Secure Shopping Privacy Policy Refund Policy WE ACCEPT Visit us athttps://www.certsgrade.com/pdf/400-101/ Powered by TCPDF (www.tcpdf.org)