♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 400-101 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/400-101-exam-dumps.html

Q271. Which two statements are true about OTV? (Choose two.) 

A. It relies on flooding to propagate MAC address reachability information. 

B. It uses a full mesh of point-to-multipoint tunnels to prevent head-end replication of multicast traffic. 

C. It can work over any transport that can forward IP packets. 

D. It supports automatic detection of multihoming. 

Answer: C,D 

Explanation: 

The overlay nature of OTV allows it to work over any transport as long as this transport can forward IP packets. Any optimizations performed for IP in the transport will benefit the OTV encapsulated traffic. As part of the OTV control protocol, automatic detection of multihoming is included. This feature enables the multihoming of sites without requiring additional configuration or protocols 

Reference: http://www.cisco.com/c/en/us/products/collateral/switches/nexus-7000-series-switches/white_paper_c11-574984.html 


Q272. Refer to the exhibit. 

The customer wants to use IP SLA to create a failover to ISP2 when both Ethernet connections to ISP1 are down. The customer also requires that both connections to ISP1 are utilized during normal operations. 

Which IP route configuration accomplishes these requirements for the customer? 

A. ip route 0.0.0.0 0.0.0.0 192.168.0.1 track 1 

ip route 0.0.0.0 0.0.0.0 192.168.1.1 track 2 

ip route 0.0.0.0 0.0.0.0 192.168.2.1 track 3 

B. ip route 0.0.0.0 0.0.0.0 192.168.0.1 track 1 

ip route 0.0.0.0 0.0.0.0 192.168.1.1 track 2 

ip route 0.0.0.0 0.0.0.0 192.168.2.1 track 4.100 

C. ip route 0.0.0.0 0.0.0.0 192.168.0.1 track 1 

ip route 0.0.0.0 0.0.0.0 192.168.1.1 track 2 

ip route 0.0.0.0 0.0.0.0 192.168.2.1 track 3.100 

D. ip route 0.0.0.0 0.0.0.0 192.168.0.1 track 1 1 

ip route 0.0.0.0 0.0.0.0 192.168.1.1 track 2 2 

ip route 0.0.0.0 0.0.0.0 192.168.2.1 track 3 3 

Answer:


Q273. Which statement is true regarding the UDP checksum? 

A. It is used for congestion control. 

B. It cannot be all zeros. 

C. It is used by some Internet worms to hide their propagation. 

D. It is computed based on the IP pseudo-header. 

Answer:

Explanation: 

The method used to compute the checksum is defined in RFC 768: “Checksum is the 16-bit one's complement of the one's complement sum of a pseudo header of information from the IP header, the UDP header, and the data, padded with zero octets at the end (if necessary) to make a multiple of two octets.” In other words, all 16-bit words are summed using one's complement arithmetic. Add the 16-bit values up. Each time a carry-out (17th bit) is produced, swing that bit around and add it back into the least significant bit. The sum is then one's complemented to yield the value of the UDP checksum field. If the checksum calculation results in the value zero (all 16 bits 0) it should be sent as the one's complement (all 1s). 

Reference: http://en.wikipedia.org/wiki/User_Datagram_Protocol 


Q274. Which two values comprise the VPN ID for an MPLS VPN? (Choose two.) 

A. an OUI 

B. a VPN index 

C. a route distinguisher 

D. a 16-bit AS number 

E. a 32-bit IP address 

Answer: A,B 

Explanation: 

Each MPLS VPN ID defined by RFC 2685 consists of the following elements: 

. An Organizational Unique Identifier (OUI), a three-octet hex number: The IEEE Registration Authority assigns OUIs to any company that manufactures 

components under the ISO/IEC 8802 standard. The OUI is used to generate universal LAN MAC addresses and protocol identifiers for use in local and metropolitan area network applications. For example, an OUI for Cisco Systems is 00-03-6B (hex). 

. A Virtual Private Network (VPN) index: a four-octet hex number, which identifies the VPN within the company. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/mp_l3_vpns/configuration/15-mt/mp-l3-vpns-15-mt-book/mp-assgn-id-vpn.html 


Q275. Which two statements best describes the difference between active mode monitoring and passive mode monitoring? (Choose two.) 

A. Active mode monitoring is the act of Cisco PfR gathering information on user packets assembled into flows by NetFlow. 

B. Active mode monitoring uses IP SLA probes for obtaining performance characteristics of the current exit WAN link. 

C. Passive mode monitoring uses IP SLA to generate probes for the purpose of obtaining information regarding the characteristics of the WAN links. 

D. Passive mode monitoring uses NetFlow for obtaining performance characteristics of the exit WAN links. 

Answer: B,D 


Q276. Refer to the exhibit. 

Traffic from CE1 to CE2 is traveling through the core instead of through R1. All the PE routers have a similar configuration, and BGP peering and extended-community meshing are configured correctly. 

Which configuration change routes the traffic through R1? 

A) 

B) 

C) 

D) 

A. Exhibit A 

B. Exhibit B 

C. Exhibit C 

D. Exhibit D 

Answer:


Q277. Refer to the exhibit. 

R1 and R2 both advertise 10.50.1.0/24 to R3 and R4 as shown. R1 is the primary path. Which path does traffic take from the R4 data center to the file server? 

A. All traffic travels from R4 to R2 to the file server. 

B. All traffic travels from R4 to R3 to R1 to the file server. 

C. Traffic is load-balanced from R4 to R2 and R3. Traffic that is directed to R3 then continues to R1 to the file server. Traffic that is directed to R2 continues to the file server. 

D. All traffic travels from R4 to R2 to R1 to the file server. 

Answer:


Q278. Which EIGRP packet types are sent as unicast packets? 

A. hello, update, query 

B. query, SIA query, reply 

C. SIA query, reply, ACK 

D. query, SIA query, SIA reply 

Answer:


Q279. Which two statements about the default router settings for SSH connections are true? (Choose two.) 

A. The default timeout value for the SSH negotiation phase is 120 seconds. 

B. Data is exchanged in clear text by default unless AAA authentication is enabled on the console. 

C. The default number of authentication retries is 3. 

D. SSH is enabled by default when you configure the username command. 

Answer: A,C 

Explanation: 

ip ssh {timeout seconds | authentication-retries number} 

Configures the SSH control parameters: 

. Specify the time-out value in seconds; the default is 120 seconds. The range is 0 to 120 seconds. This parameter applies to the SSH negotiation phase. After the connection is established, the Switch uses the default time-out values of the CLI-based sessions. By default, up to five simultaneous, encrypted SSH connections for multiple CLI-based sessions over the network are available (session 0 to session 4). After the execution shell starts, the CLI-based session time-out value returns to the default of 10 minutes. 

. Specify the number of times that a client can re-authenticate to the server. The default is 3; the range is 0 to 5. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3850/software/release/3se/secur ity/configuration_guide/b_sec_3se_3850_cg/b_sec_3se_3850_cg_chapter_01000.html 


Q280. Which option is the default maximum age of the MAC address table? 

A. 300 seconds 

B. 500 seconds 

C. 1200 seconds 

D. 3600 seconds 

Answer:

Explanation: 

To configure the maximum aging time for entries in the Layer 2 table, use the mac-address-table aging-time command in global configuration mode. 

Syntax Description 

seconds 

MAC address table entry maximum age. Valid values are 0, and from 5 to 1000000 seconds. Aging time is counted from the last time that the switch detected the MAC address. The default value is 300 seconds. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/lanswitch/command/reference/lsw_book/lsw_m1. html