Free 400-101 Cisco Dumps Online V44.02 - DumpsBase 400-101 Dumps Questions

Page 1

DUMPS BASE

EXAM DUMPS

CISCO 400-101

28% OFF Automatically For You CCIE Routing and Switching Written Exam


1.Which two statements about PfR are true? (Choose two) A. It always prefers the least cost path B. It provides intelligent route control on a per-application basis C. It supports split tunneling and spoke-to-spoke links D. It manages traffic classes E. It provides a narrower scope of route control than OER Answer: BD

2.Which three values are used to generate a unique bridge ID for each VLAN in PVST+? (Choose three) A. switch priority B. spanning-tree MAC address C. port cost D. max age E. extended system ID F. port priority Answer: ABE

3.Refer to the exhibit.


Which two actions can you take to allow the network 172.29.224.0/24 to be reachable from peer 192.168.250.53? (Choose two) A. Modify the community' list to match community 64513:64090 attached to 172.29.224.0/24 B. Modify the inbound route map to permit all additional traffic C. Modify the outbound route map to permit all additional traffic D. Configure soft reconfiguration to peering 192.168.250.53 E. Configure additional address families to peering 192.168.250.53 Answer: AC

4.Which IPv6 solution provides network information to clients without providing an IPv6 host address? A. prefix delegation


B. autoconfiguration C. stateless DHCPv6 D. stateful DHCPv6 Answer: A

5.How does MSTP maintain compatibility with RSTP? A. MSTP supports five port states in the same way as RSTP B. RSTP encodes region information from an MSTP BPDU into a single instance C. RSTP implements a TTL that is compatible with the MSTP max age timer D. MSTP sends all spanning-tree information in one BPDU Answer: D

6.Which three statements correctly describe the encoding used by NETCONF and RESTCONF? (Choose three) A. RESTCONF uses XML-encoded data B. RESTCONF uses JSON-encoded data C. NETCONF uses XML-encoded data D. RESTCONF uses YAML-encoded data E. NETCONF uses JSON-encoded data F. NETCONF uses YAML-encoded data Answer: ABC

7.Which three basic types of SD-WAN deployments are out on the market? (Choose three) A. policy-based SD-WAN B. MPLS-based SD-WAN C. managed service SD-WAN D. secure SD-WAN service E. SD-WAN as-a-Service F. internet-based SD-WAN Answer: CEF

8.Which two limitations of PIM snooping are true? (Choose two) A. 224.0.1.39 and 224.0.1.40 are always flooded B. All join and prune messages are flooded to all router ports C. All traffic in sparse group mode is treated as unknown traffic and dropped D. If non-PIMv2 multicast routers are on the network, they are flooded with all traffic E. Directly connected sources are supported only for unidirectional PIM groups Answer: AD


9.A 1 Gbps router interface to a nearby data center is showing tens of thousands of egress drops per day. The round trip time is 2ms and the average packet size is 1000 bytes. An analysis shows that the traffic is TCP-based business application traffic. All traffic is important, so QoS will not help. You decide to increase egress buffers, keeping in mind that the TCP retransmit timer is 2*SRTT. What is the maximum amount of buffering that can be used to reduce the impact on the applications without impacting application throughput? A. Increase the number of buffers until the drops decreases to an acceptable level. B. Increase the number of buffers to hold the amount of data in the TCP retransmit timer, (two times the RTT, or 4ms) of data at 1 Gbps (500 packets). C. Increase the number of buffers to hold the amount of data in the Bandwidth Delay Product or 2ms of data at 1 Gbps (250 packets). D. The default number of buffers is sufficient, the network is performing as it should. Answer: B

10. Which value does EIGRP use to determine the metric for a summary address? A. the lowest metric among the component routes B. a default fixed value C. the highest metric among the component routes D. the average of the component metrics Answer: A

11. Refer to the exhibit.

Which two effects of this configuration are true? (Choose two) A. It creates an administratively scoped boundary for ACL 60 B. It sets the TTL for discovery messages to 60 hops C. It configures the router as a potential rendezvous point D. It prevents the device from falling back to dense mode E. It sets the announcement interval to 60 seconds Answer: BC


12. Drag and drop the MPLS term on the left to the function it performs on the right.

Answer:


13. Which two statements about IP SLA are true? (Choose two) A. SNMP access is not supported B. It uses active traffic monitoring C. The IP SLA responder is a component in the source Cisco device D. It uses NetFIow for passive traffic monitoring E. It is Layer 2 transport-independent F. It can measure MOS Answer: BE

14. Which command can you enter to prevent a router from displaying Telnet connection messages on the terminal? A. ip telnet hidden address B. ip telnet quiet C. no ip domain-lookup D. ip telnet hidden hostname E. service telnet-zeroidle Answer: B


15. Refer to the exhibit.

When R2 attempted to copy a file from the TFTP server, it received tjis error message. When action can you take to correct the problem? A. Configure the ip tftp source-interface Loopback0 command on R2 B. Configure the ip tftp source-interface Fa011 command on R2 C. Configure the ip tftp source-interface Loopback0 command on R1 D. Change the access-list configuration on RI to access-list 1 permit 172.16.1.0 0.0.0.255 E. Configure the ip tftp source-interface Fa011 command on R1 Answer: A

16. One of your dients which is in the manufacturer area, is after a solution in order to manage all his fog node. Which management tool best suits his needs? A. Cisco Prime Infrastructure B. Cisco Fog Director C. Cisco Network Control System D. Cisco Connected Grid Network Management System Answer: A

17. Which two conditions can cause unicast flooding? (Choose two)


A. forwarding table overflow B. RIB table overflow C. recurring TCNs D. multiple MAC addresses in the Layer 2 forwarding table E. symmetric routing Answer: AC

18. Which three benefts of virtualizing the DMZ are true? (Choose three) A. per-app network functions and operation B. dynamic and automated service insertion with focus on security C. analytics D. orchestration E. usage-based consumption model F. service catalog Answer: CDF

19. Which two statements about OSPFv3 are true? (Choose two) A. It supports unicast address families for IPv4 and IPv6 B. It supports unicast address families for IPv6 only C. It supports the use of a cluster ID for loop prevention D. It supports only one address family per instance E. It supports multicast address families for IPv6 only F. It supports multicast address families for IPv4 and IPv6 Answer: AD

20. Which two statements about root guard and loop guard are true? (Choose two) A. When loop guard is enabled, the port is transtioned to the root-inconsistent state B. Root guard disables an interface only when a superior BPDU is received C. Loop guard uses its own keepalives to prevent loops by detecting failures D. Root guard should be enabled on an upstream interface E. Loop guard uses BPDU keepalives to determine unidirectional traffic F. Loop guard uses its own keepalives to determine unidirectional traffic Answer: BE

21. Refer to the exhibit.


PC is experiencing intermittent connectivity' failures to the internet. If ADSL-RI uses a PPPoE connection, what action can you take to correct the problem? A. Configure OSPF on the connection between PCI and HomeS1 B. Replace the dialer interface with a virtual template C. Configure a system MTU of 1512 on ADSL-R1 D. Configure the same OSPF process on HomeR1 and HomeS1 E. Configure an MTU of 1492 on the dialer interface on ADSL-R1 Answer: E

22. Refer to the exhibit.

A. If a Layer 3 switch running OSPF in a VRF-Iite configuration reports this error, which action can you take to correct the problem? B. Upgrade the Layer 3 switch to a model that can support more routes C. Configure the control plane with a larger memory allocation to support the Cisco ExpressForwarding Information Base D. Set mls cef maximum-routes in the global configuration Answer: D

23. Which technology uses MPLS to provide IPv6 connectivity to customers in the core network without the need for dual-stack? A. 6PE B. NAT64 C. 6to4


D. NAT Answer: A

24. Refer to the exhibit.

What are two effects of the given configuration? (Choose two) A. The router will fail to form neighbor adjacencies over all EIGRP interfaces except F0/0 B. The router will manually summarize the 192.168.12.0/27 network C. The router will fail to form neighbor adjacencies over interface F0/0 D. The router will install the 192.168.12.0/27 network into its EIGRP topology table E. Auto-summarization will be enabled on the F0/0 interface Answer: CD

25. Drag and drop the BGP attributes on the left to the correct category on the right Not all options will be used.


Answer:

26.What is a reason for an EIGRP router to send an SIA reply to a peer? A. to respond to a query reporting that the prefix has gone stuck active B. to respond to an SIA query with the alternative path requested C. to respond to a reply reporting that the prefix has gone stuck-in-active D. to respond to an SIA query that the router is still waiting on replies from its peers Answer: D


27.Which information is contained in an OSPF Type 7 Not-So-Stubby Area NSSA External LSA? A. The paths and costs to reach other stub area border routers in the OSPF routing domain B. The address of routers that connect the current area to other areas and the cost to reach those routers C. External network address, mask, and cost to reach each network that is external to the OSPF domain and only within the NSSA D. The external network address, mask, and cost to reach networks that are external to the OSPF NSSA, including the default route E. The paths and costs to all OSPF NSSA areas that are external to the current area Answer: C

28.Which statement about NAT64 is true? A. NAT64 requires the use of DNS64 B. NAT64 provides address family translation and can translate only IPv6 to IPv4 C. NAT64 should be considered as a permanent solution D. NAT64 provides address family translation and translates IPv4 to IPv6 and IPv6 to IPv4 Answer: D

29.Which three components are in an MPLS hearder? (Choose three) A. a 3-bit experimental use field B. a 8-bit TTL C. a 20-bit label D. a 4-bit experimental use field E. a 2-bit botton of stack F. a 4-bit label stack entry Answer: ABC

30.Which two options are restrictions of BGP Outbound Route Filtering? (Choose two) A. It can be used only with IPv4 multicast B. Multicast is not supported C. It requires access lists to match routes D. It can be used only with eBGP E. It can be used only with iBGP Answer: BD


GET FULL VERSION OF 400-101 DUMPS

Powered by TCPDF (www.tcpdf.org)


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.