♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Cisco 400-101 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/400-101-exam-dumps.html
Q231. Refer to the exhibit.
Which two options are effects of the given configuration? (Choose two.)
A. It sets the data export destination to 209.165.200.227 on UDP port 49152.
B. It enables Cisco Express Forwarding on interface FastEthernet0/0.
C. It configures the export process to include the BGP peer AS of the router gathering the data.
D. It enables NetFlow switching on interface FastEthernet0/0.
E. It sets the data export destination to 209.165.200.227 on TCP port 49152.
Answer: A,D
Explanation:
The “ip flow-export destination 209.165.200.227 49152” command specifies that the data export destination server is 209.165.200.227 using UDP port 49152.
The “ip route-cache flow” command under the fastethernet 0/0 interface enable netflow switching on that interface.
Q232. Which two options are requirements for Control-Plane Policing? (Choose two.)
A. Cisco Express Forwarding must be enabled globally.
B. Cisco Discovery Protocol must be disabled in the control plane.
C. A crypto policy must be installed.
D. A loopback address must be configured for device access.
E. A class map must be configured to identify traffic.
Answer: A,E
Q233. Which command correctly configures standby tracking for group 1 using the default decrement priority value?
A. standby 1 track 100
B. standby 1 track 100 decrement 1
C. standby 1 track 100 decrement 5
D. standby 1 track 100 decrement 20
Answer: A
Q234. Which three address family types does EIGRP support? (Choose three.)
A. IPv4 unicast
B. IPv4 multicast
C. IPv6 unicast
D. IPv6 multicast
E. IPv4 anycast
F. IPv6 anycast
Answer: A,B,C
Q235. Which three condition types can be monitored by crypto conditional debug? (Choose three.)
A. Peer hostname
B. SSL
C. ISAKMP
D. Flow ID
E. IPsec
F. Connection ID
Answer: A,D,F
Explanation:
Supported Condition Types
The new crypto conditional debug CLIs--debug crypto condition, debug crypto condition unmatched, and show crypto debug-condition--allow you to specify conditions (filter values) in which to generate and display debug messages related only to the specified conditions. The table below lists the supported condition types.
Table 1 Supported Condition Types for Crypto Debug CLI
Condition Type (Keyword)
Description
connid 1
An integer between 1-32766. Relevant debug messages will be shown if the current IPSec operation uses this value as the connection ID to interface with the crypto engine.
flowid 1
An integer between 1-32766. Relevant debug messages will be shown if the current IPSec operation uses this value as the flow-ID to interface with the crypto engine.
FVRF
The name string of a virtual private network (VPN) routing and forwarding (VRF) instance. Relevant debug messages will be shown if the current IPSec operation uses this VRF instance as its front-door VRF (FVRF).
IVRF
The name string of a VRF instance. Relevant debug messages will be shown if the current IPSec operation uses this VRF instance as its inside VRF (IVRF).
peer group
A Unity group-name string. Relevant debug messages will be shown if the peer is using this group name as its identity.
peer hostname
A fully qualified domain name (FQDN) string. Relevant debug messages will be shown if the peer is using this string as its identity; for example, if the peer is enabling IKE Xauth with this FQDN string.
peeripaddress
A single IP address. Relevant debug messages will be shown if the current IPSec operation is related to the IP address of this peer.
peer subnet
A subnet and a subnet mask that specify a range of peer IP addresses. Relevant debug messages will be shown if the IP address of the current IPSec peer falls into the specified subnet range.
peer username
A username string. Relevant debug messages will be shown if the peer is using this username as its identity; for example, if the peer is enabling IKE Extended Authentication (Xauth) with this username.
SPI 1
A 32-bit unsigned integer. Relevant debug messages will be shown if the current IPSec operation uses this value as the SPI.
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnips/configuration/xe-3s/sec-sec-for-vpns-w-ipsec-xe-3s-book/sec-crypto-debug-sup.html
Q236. DRAG DROP
Drag and drop the events on the left to dispaly the correct sequence on the right when CoPP is enabled.
Answer:
Q237. Refer to the exhibit.
Which statement is true?
A. R1 routes this pseudowire over MPLS TE tunnel 1 with transport label 20.
B. The default route 0.0.0.0/0 is available in the IPv4 routing table.
C. R1 is using an MPLS TE tunnel for this pseudowire, because the IP path is not available.
D. R1 has preferred-path configured for the pseudowire.
Answer: D
Explanation:
Verifying the Configuration: Example In the following example, the show mpls l2transport vc command shows the following information (in bold) about the VCs:
. VC 101 has been assigned a preferred path called Tunnel1. The default path is disabled because the preferred path specified that the default path should not be used if the preferred path fails.
. VC 150 has been assigned an IP address of a loopback address on PE2. The default path can be used if the preferred path fails.
Router# show mpls l2transport vc detail
Local interface. Gi0/0/0.1 up, line protocol up, Eth VLAN 222 up
Destination address: 10.16.16.16, VC ID. 101, VC status: up
Preferred path: Tunnel1, active
Default path: disabled
Tunnel label: 3, next hop point2point
Output interfacE. Tu1, imposed label stack {17 16}
Create timE. 00:27:31, last status change timE. 00:27:31
Signaling protocol: LDP, peer 10.16.16.16:0 up
MPLS VC labels: local 25, remote 16
Group ID. local 0, remote 6
MTU: local 1500, remote 1500
Remote interface description:
Sequencing: receive disabled, send disabled
VC statistics:
packet totals: receive 10, send 10
byte totals: receive 1260, send 1300
packet drops: receive 0, send 0
Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2sr/12_2sra/feature/guide/srtunsel.html#wp10 57815
Q238. Which two options are EEM policies? (Choose two.)
A. applets
B. event detectors
C. scripts
D. syslogs
E. actions
Answer: A,C
Q239. DRAG DROP
Drag and drop the OTV component on the left to the function it performs on the right.
Answer:
Q240. Which type of EIGRP routes are summarized by the auto-summary command?
A. internal routes that are learned from a peer that is outside the range of local network statements
B. external routes that are learned from a peer that is inside the range of local network statements
C. locally created routes that are outside the range of local network statements
D. external routes that are learned from a peer that is outside the range of local network statements
Answer: B
Explanation:
Auto-Summarization of External Routes
EIGRP will not auto-summarize external routes unless there is a component of the same major network that is an internal route. To illustrate, let us look at Figure 15.
Router Three is injecting external routes to 192.1.2.0/26 and 192.1.2.64/26 into EIGRP using the redistribute connected command, as shown in the configurations below.
Router Three
interface Ethernet0
ip address 192.1.2.1 255.255.255.192
!
interface Ethernet1
ip address 192.1.2.65 255.255.255.192
!
interface Ethernet2
ip address 10.1.2.1 255.255.255.0
!router eigrp 2000
redistribute connected
network 10.0.0.0
default-metric 10000 1 255 1 1500
With this configuration on Router Three, the routing table on Router One shows:
one# show ip route
10.0.0.0/8 is subnetted, 2 subnets
D 10.1.2.0 [90/11023872] via 10.1.50.2, 00:02:03, Serial0
C 10.1.50.0 is directly connected, Serial0
192.1.2.0/26 is subnetted, 1 subnets
D EX 192.1.2.0 [170/11049472] via 10.1.50.2, 00:00:53, Serial0
D EX 192.1.2.64 [170/11049472] via 10.1.50.2, 00:00:53, Serial0
Although auto-summary normally causes Router Three to summarize the 192.1.2.0/26 and 192.1.2.64/26 routes into one major net destination (192.1.2.0/24), it does not do this because both routes are external. However, if you reconfigure the link between Routers Two and Three to 192.1.2.128/26, and add network statements for this network on Routers Two and Three, the 192.1.2.0/24 auto-summary is then generated on Router Two.
Router Three
interface Ethernet0
ip address 192.1.2.1 255.255.255.192
!
interface Ethernet1
ip address 192.1.2.65 255.255.255.192
!
interface Serial0
ip address 192.1.2.130 255.255.255.192
!
router eigrp 2000 network 192.1.2.0
Now Router Two generates the summary for 192.1.2.0/24:
two# show ip route
D 192.1.2.0/24 is a summary, 00:06:48, Null0
And Router One shows only the summary routE.
one# show ip route
10.0.0.0/8 is subnetted, 1 subnets
C 10.1.1.0 is directly connected, Serial0
D 192.1.2.0/24 [90/11023872] via 10.1.50.2, 00:00:36, Serial0
Reference: http://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/16406-eigrp-toc.html