Latest 400-101 Dumps - Real Exam 400-101 Questions 2018

The Cisco CCIE Routing and Switching written exam validate that professionals have the expertise to: configure, validate, and troubleshoot complex enterprise network infrastructure; understand how infrastructure components interoperate; and translate functional requirements into specific device configurations.


For More Details:

https://www.certswarrior.com/exam/400-101/

Question: 1

Which two statements about 802.10 tunneling are true? (Choose two.)

A. It requires a system MTU of at least 1504 bytes.

B. The default configuration sends Cisco Discovery Protocol, STP: and VTP information.

C. Traffic that traverses the tunnel is encrypted.

D. It is supported on private VLAN ports.

E. MAC-based QoS and UDLD are supported on tunnel ports.

F. Its maximum allowable system MTU is 1546 bytes.

Answer: A, E

Question: 2

When you deploy DMVPN, what is the purpose of the command crypto is a kmp key ciscotest address 0.0.0.0 0.0.0.0?

A. It is configured on hub and spoke router to establish peering

B. It is configured on hub to set the pre-shared key for the spoke routers

C. It is configured on the spokes to indicate the hub router

D. It is configured on the Internet PE routers to allow traffic to traverse the ISP core

Answer: B

Question: 3

Which way to influence path selection with EIGRP is preferred?

A. changing the bandwidth, because it does not have any impact on other router features.

B. changing the bandwidth, because that is what Cisco recommends.

C. changing the bandwidth, because ii must be done only on one interface along the path.

D. changing the delay, even if it must be done on multiple interfaces

Answer: D

Question: 4

In which 802.1D port state are the root bridge. the root port, and the designated port(s) elected?

A. Listening

B. Forwarding

C. Learning

D. Disabled

E. Blocking

Answer: A

Question: 5

What are three valid HSRP states? (Choose three.)

A. listen

B. learning

C. full

D. established

E. speak

F. INIT

Answer: A, B, E

Question: 6

External EIGRP route exchange on routers R1 and R2 was failing because the routers had duplicate router IDs. You changed the eigrp router-id command on R1, but the problem persists. With additional action must you take to enable the routers to exchange routes?

A. Change the corresponding loopback address.

B. Change the router ID on R2.

C. Reset the EIGRP neighbor relationship.

D. Clear the EIGRP process.

Answer: D

Question: 7

Which two statement about the EIGRP Over the Top feature are true? (Choose two.)

A. EIGRP routers traffic between the PE devices.

B. Traffic is LISP-encapsulated on the control plan

C. The neighbor command must be configured with USP encapsulation on each CE device

D. The network statement must be configured on each PE device to connect separate EIGRP sites.

E. Traffic is LISP-encapsulated on the data plan

Answer: C, E

Question: 8

Which two statements about 1Pv6 6to4 tunnels are true? (Choose two)

A. Sites use addresses from the 2002::/16 prefix

B. Sites use addresses from link-local scope

C. They are point-to-multipoint tunnels

D. They are point-to-point tunnels

E. They rely on GRE encapsulation

Answer: C, C

Question: 9

What is the source MAC address of a BPDU frame that is sent out of a port?

A. the lowest MAC address on the switch

B. the highest MAC address on the switch

C. the MAC address of the individual port that is sending the BPDU

D. the same as the MAC address in the bridge ID

Answer: C

Question: 10

What command can you enter to configure NBAR to recognize VNC traffic?

A. ip nbar port-map VNC hex OxAA Ox1B

B. ip nbar custom-map VNC tcp-udp 5900 5901

C. ip nbar port-to-application seq 5 VNC tcp 5900 5901

D. ip nbar application-map VNC udp 5900 5901

E. ip nbar port-map VNC tcp 5900 5901

Answer: E

Question: 11

How many address families can a single OSPFv3 instance support?

A. 1

B. 2

C. 5

D. 10

Answer: A

Question: 12

Which two items must be confined to capture packet data with the Embedded Packet Capture feature? (Choose two)

A. the capture point

B. the capture buffer

C. the capture file export location

D. the capture filter

E. the capture rate

F. the buffer memory size

Answer: A, B

Question: 13

Which three statements describe the characteristics of a VPLS architecture? (Choose three)

A. It can suppress the flooding of traffic.

B. It supports MAC address aging.

C. It forwards Ethernet frames.

D. It maps MAC address destinations to IP next hops.

E. It conveys MAC address reaehabi1ity information in a separate control protocol.

F. It replicates broadcast and multicast frames to multiple ports.

Answer: B, C, F

Question: 14

Which three statements are true about PPP CHAP authentication? (Choose three.)

A. PPP encapsulation must be enabled globally.

B. The LCP phase must be complete and in closed state.

C. The hostname used by a router for CHAP authentication cannot be changed.

D. PPP encapsulation must be enabled on the interface.

E. The LCP phase must be complete and in open state.

F. By default, the router uses its hostname to identify itself to the peer.

Answer: D, E, F

Question: 15

Which command can you enter to prevent IS-IS POUs from using the full MTU size?

A. no hello padding

B. set-overload-bit on-startup 120

C. metric-style wide

D. set-overload-bit on-startup wait- for-bgp suppress interlevel

Answer: A

For More Details:

https://www.certswarrior.com/exam/400-101/

Use Coupon code "20off2018" to enjoy 20% off.

0コメント

  • 1000 / 1000