It is impossible to pass Cisco 400-101 exam without any help in the short term. Come to Pass4sure soon and find the most advanced, correct and guaranteed Cisco 400-101 practice questions. You will get a surprising result by our Far out CCIE Routing and Switching (v5.0) practice guides.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 400-101 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/400-101-exam-dumps.html

2021 Apr 400-101 free question

Q41. DRAG DROP 

Drag and drop the Cisco IOX XE subpackage on the left to the function it performs on the right. 

Answer: 


Q42. DRAG DROP 

Drag and drop the BGP attribute on the left to the correct category on the right. 

Answer: 


Q43. DRAG DROP 

Drag and drop the multicast protocol definition on the left to the correct default time interval on the right. 

Answer: 


Q44. What is a key advantage of Cisco GET VPN over DMVPN? 

A. Cisco GET VPN provides zero-touch deployment of IPSEC VPNs. 

B. Cisco GET VPN supports certificate authentication for tunnel establishment. 

C. Cisco GET VPN has a better anti-replay mechanism. 

D. Cisco GET VPN does not require a secondary overlay routing infrastructure. 

Answer:

Explanation: 

DMVPN requires overlaying a secondary routing infrastructure through the tunnels, which results in suboptimal routing while the dynamic tunnels are built. The overlay routing topology also reduces the inherent scalability of the underlying IP VPN network topology. Traditional point-to-point IPsec tunneling solutions suffer from multicast replication issues because multicast replication must be performed before tunnel encapsulation and encryption at the IPsec CE (customer edge) router closest to the multicast source. Multicast replication cannot be performed in the provider network because encapsulated multicasts appear to the core network as unicast data. Cisco’s Group Encrypted Transport VPN (GET VPN) introduces the concept of a trusted group to eliminate point-to-point tunnels and their associated overlay routing. All group members (GMs) share a common security association (SA), also known as a group SA. This enables GMs to decrypt traffic that was encrypted by any other GM. (Note that IPsec CE acts as a GM.) In GET VPN networks, there is no need to negotiate point-to- point IPsec tunnels between the members of a group, because GET VPN is “tunnel-less.” 

Reference: Group Encrypted Transport VPN (Get VPN) Design and Implementation Guide PDF 


Q45. Which two statements are true about an EPL? (Choose two.) 

A. It is a point-to-point Ethernet connection between a pair of NNIs. 

B. It allows for service multiplexing. 

C. It has a high degree of transparency. 

D. The EPL service is also referred to as E-line. 

Answer: C,D 

Explanation: 

Ethernet private line (EPL) and Ethernet virtual private line (EVPL) are carrier Ethernet data services defined by the Metro Ethernet Forum. EPL provides a point-to-point Ethernet virtual connection (EVC) between a pair of dedicated user–network interfaces (UNIs), with a high degree of transparency. EVPL provides a point-to-point or point-to-multipoint connection between a pair of UNIs. The services are categorized as an E-Line service type, with an expectation of low frame delay, frame delay variation and frame loss ratio. EPL is implemented using a point-to-point (EVC) with no Service Multiplexing at each UNI (physical interface), i.e., all service frames at the UNI are mapped to a single EVC (a.k.a. all-to-one bundling). 

Reference: http://en.wikipedia.org/wiki/Ethernet_Private_Line 


Leading 400-101 free question:

Q46. Refer to the exhibit. 

Why is the router out of memory? 

A. The router is experiencing a BGP memory leak software defect. 

B. The BGP peers have been up for too long. 

C. The amount of BGP update traffic in the network is too high. 

D. The router has insufficient memory due to the size of the BGP database. 

Answer:

Explanation: 

Here we can see that this router is running out of memory due to the large size of the BGP routing database. In this case, this router is receiving over 200,000 routes from each of the 4 peers. 


Q47. Which two actions can you take to allow the greatest number of pertinent packets to be stored in the temporary buffer of Cisco IOS Embedded Packet Capture? (Choose two.) 

A. Specify the sampling interval. 

B. Specify the capture buffer type. 

C. Specify a reflexive ACL. 

D. Specify the minimum packet capture rate. 

E. Specify the packet size. 

F. Store the capture simultaneously onto an external memory card as the capture occurs. 

Answer: A,B 

Explanation: 

Embedded Packet Capture (EPC) provides an embedded systems management facility that helps in tracing and troubleshooting packets. This feature allows network administrators to capture data packets flowing through, to, and from a Cisco device. The network administrator may define the capture buffer size and type (circular, or linear) and the maximum number of bytes of each packet to capture. The packet capture rate can be throttled using further administrative controls. For example, options allow for filtering the packets to be captured using an Access Control List and, optionally, further defined by specifying a maximum packet capture rate or by specifying a sampling interval. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/epc/configuration/xe-3s/asr1000/epc-xe-3s-asr1000-book/nm-packet-capture-xe.html 


Q48. Which statement about the feasibility condition in EIGRP is true? 

A. The prefix is reachable via an EIGRP peer that is in the routing domain of the router. 

B. The EIGRP peer that advertises the prefix to the router has multiple paths to the destination. 

C. The EIGRP peer that advertises the prefix to the router is closer to the destination than the router. 

D. The EIGRP peer that advertises the prefix cannot be used as a next hop to reach the destination. 

Answer:

Explanation: 

The advertised metric from an EIGRP neighbor (peer) to the local router is called Advertised Distance (or reported distance) while the metric from the local router to that network is called Feasible Distance. For example, R1 advertises network 10.10.10.0/24 with a metric of 20 to R2. For R2, this is the advertised distance. R2 calculates the feasible distance by adding the metric from the advertised router (R1) to itself. So in this case the feasible distance to network 10.10.10.0/24 is 20 + 50 = 70. 

Before a router can be considered a feasible successor, it must pass the feasibility condition rule. In short, the feasibility condition says that if we learn about a prefix from a neighbor, the advertised distance from that neighbor to the destination must be lower than our feasible distance to that same destination. Therefore we see the Advertised Distance always smaller than the Feasible Distance to satisfy the feasibility condition. 


Q49. Which two statements about proxy ARP are true? (Choose two.) 

A. It is supported on networks without ARP. 

B. It allows machines to spoof packets. 

C. It must be used on a network with the host on a different subnet. 

D. It requires larger ARP tables. 

E. It reduces the amount of ARP traffic. 

Answer: B,D 

Explanation: 

Disadvantages of Proxy ARP 

Hosts have no idea of the physical details of their network and assume it to be a flat network in which they can reach any destination simply by sending an ARP request. But using ARP for everything has disadvantages. These are some of the disadvantages: 

It increases the amount of ARP traffic on your segment. 

Hosts need larger ARP tables in order to handle IP-to-MAC address mappings. 

Security can be undermined. A machine can claim to be another in order to intercept packets, an act called "spoofing." 

It does not work for networks that do not use ARP for address resolution. 

It does not generalize to all network topologies. For example, more than one router that connects two physical networks. 

Reference: http://www.cisco.com/c/en/us/support/docs/ip/dynamic-address-allocation-resolution/13718-5.html 


Q50. Which three options are best practices for implementing a DMVPN? (Choose three.) 

A. Use IPsec in tunnel mode. 

B. Implement Dead Peer Detection to detect communication loss. 

C. Configure AES for encryption of transported data. 

D. Configure SHA-1 for encryption of transported data. 

E. Deploy IPsec hardware acceleration to minimize router memory overhead. 

F. Configure QoS services only on the head-end router. 

Answer: A,B,C 

Explanation: 

Best Practices Summary for Hub-and-Spoke Deployment Model 

This section describes the best practices for a dual DMVPN cloud topology with the hub-and-spoke deployment, supporting IP multicast (IPmc) traffic including routing protocols. 

The following are general best practices: 

. Use IPsec in transport mode 

. Configure Triple DES (3DES) or AES for encryption of transported data (exports of encryption algorithms to certain countries may be prohibited by law). 

Implement Dead Peer Detection (DPD) on the spokes to detect loss of communication between peers. 

. Deploy hardware-acceleration of IPsec to minimize router CPU overhead, to support traffic with low latency and jitter requirements, and for the highest performance for cost. 

. Keep IPsec packet fragmentation to a minimum on the customer network by setting MTU size or using Path MTU Discovery (PMTUD). 

. Use Digital Certificates/Public Key Infrastructure (PKI) for scalable tunnel authentication. 

. Configure a routing protocol (for example, EIGRP, BGP or OSPF) with route summarization help alleviate interface congestion issues and to attempt to keep higher priority traffic from being dropped during times of congestion. 

Reference: http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/WAN_and_MAN/DMVPDG/DMV PN_1.html