♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 400-101 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/400-101-exam-dumps.html

Q121. Which three statements about the route preference of IS-IS are true? (Choose three.) 

A. An L1 path is preferred over an L2 path. 

B. An L2 path is preferred over an L1 path. 

C. Within each level, a path that supports optional metrics is preferred over a path that supports only the default metric. 

D. Within each level of metric support, the path with the lowest metric is preferred. 

E. The Cisco IS-IS implementation usually performs equal cost path load balancing on up to eight paths. 

F. Both L1 and L2 routes will be installed in the routing table at the same time. 

Answer: A,C,D 

Explanation: 

Given multiple possible routes to a particular destination, an L1 path is preferred over an L2 path. Within each level, a path that supports the optional metrics is preferred over a path that supports only the default metric. (Again, Cisco supports only the default metric, so the second order of preference is not relevant to Cisco routers.) Within each level of metric support, the path with the lowest metric is preferred. If multiple equal-cost, equal-level paths are found by the Decision process, they are all entered into the route table. The Cisco IS-IS implementation usually performs equal-cost load balancing on up to six paths. 

Reference: http://www.realccielab.org/operation-of-integrated-is-is.html 


Q122. Refer to the exhibit. 

With these configurations for R1 and R2, which statement about PPP authentication is true? 

A. Authentication fails because R1 is missing a username and password. 

B. R2 responds with the correct authentication credentials. 

C. R2 requires authentication from R1. 

D. R1 requires authentication from R2. 

Answer:

Explanation: 

Only R2 is configured with the “PPP authentication PAP” command so it requires authentication from R1, but R1 does not require authentication from R2. 


Q123. Which two statements about the function of the stub feature in EIGRP are true? (Choose two.) 

A. It stops the stub router from sending queries to peers. 

B. It stops the hub router from sending queries to the stub router. 

C. It stops the stub router from propagating dynamically learned EIGRP prefixes to the hub routers. 

D. It stops the hub router from propagating dynamically learned EIGRP prefixes to the stub routers. 

Answer: B,C 

Explanation: 

When using the EIGRP Stub Routing feature, you need to configure the distribution and remote routers to use EIGRP, and to configure only the remote router as a stub. Only specified routes are propagated from the remote (stub) router. The router responds to queries for summaries, connected routes, redistributed static routes, external routes, and internal routes with the message "inaccessible." A router that is configured as a stub will send a special peer information packet to all neighboring routers to report its status as a stub router. Without the stub feature, even after the routes that are sent from the distribution router to the remote router have been filtered or summarized, a problem might occur. If a route is lost somewhere in the corporate network, EIGRP could send a query to the distribution router, which in turn will send a query to the remote router even if routes are being summarized. If there is a problem communicating over the WAN link between the distribution router and the remote router, an EIGRP stuck in active (SIA) condition could occur and cause instability elsewhere in the network. The EIGRP Stub Routing feature allows a network administrator to prevent queries from being sent to the remote router. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/eigrpstb.html 


Q124. What is the function of NSF? 

A. forward traffic simultaneously using both supervisors 

B. forward traffic based on Cisco Express Forwarding 

C. provide automatic failover to back up supervisor in VSS mode 

D. provide nonstop forwarding in the event of failure of one of the member supervisors 

Answer:


Q125. Which three statements about EVCs are true? (Choose three.) 

A. Spanning Tree must use MST mode on EVC ports. 

B. PAGP is supported on EVC ports. 

C. Spanning Tree must use RSTP mode on EVC ports. 

D. LACP is supported on EVC ports. 

E. Layer 2 multicast framing is supported. 

F. Bridge domain routing is required. 

Answer: A,B,D 

Explanation: 

EVC support requires the following: 

–The spanning tree mode must be MST. 

–The dot1ad global configuration mode command must be configured. 

These Layer 2 port-based features can run with EVC configured on a port: 

–PAGP 

–LACP 

–UDLD 

–LLDP 

–CDP 

–MSTP 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SY/configuration/guide/sy_swcg/ethernet_virtual_connection.html 


Q126. You are configuring a DMVPN spoke to use IPsec over a physical interface that is located within a VRF. For which three configuration sections must you specify the VRF name? (Choose three.) 

A. the ISAKMP profile 

B. the crypto keyring 

C. the IPsec profile 

D. the IPsec transform set 

E. the tunnel interface 

F. the physical interface 

Answer: B,E,F 

Explanation: 

ip vrf forwardingvrf-name 

Example: 

Router(config-if)# ip vrf forwarding green 

Associates a virtual private network (VPN) routing and forwarding (VRF) instance with an interface or subinterface. 

. vrf-name is the name assigned to a VRF. 

Router(config-if)# tunnel vrfvrf-name 

Example: 

Router(config-if)# tunnel vrf finance1 

Associates a VPN routing and forwarding (VRF) instance with a specific tunnel destination. vrf-name is the name assigned to a VRF. 

Router(config)# crypto keyringkeyring-name [vrf fvrf-name] 

Defines a crypto keyring to be used during IKE authentication and enters keyring configuration mode. 

. keyring-name—Name of the crypto keyring. 

. fvrf-name—(Optional) Front door virtual routing and forwarding (FVRF) name to which the keyring will be referenced. fvrf-name must match the FVRF name that was defined during virtual routing and forwarding (VRF) configuration 


Q127. Which two BGP path attributes are visible in Wireshark? (Choose two.) 

A. weight 

B. AS path 

C. local preference 

D. route maps 

Answer: B,C 


Q128. DRAG DROP 

Drag and drop the NHRP flag on the left to the corresponding meaning on the right. 

Answer: 


Q129. DRAG DROP 

Drag and drop the EIGRP query condition on the left to the corresponding action taken by the router on the right. 

Answer: 


Q130. Refer to the exhibit. 

If the traffic flowing from network 192.168.254.0 to 172.16.250.0 is unencrypted, which two actions must you take to enable encryption? (Choose two). 

A. Configure the transform-set on R2 to match the configuration on R1. 

B. Configure the crypto map on R2 to include the correct subnet. 

C. Configure the ISAKMP policy names to match on R1 and R2. 

D. Configure the crypto map names to match on R1 and R2. 

E. Configure the Diffie-Hellman keys used in the ISAKMP policies to be different on R1 and R2. 

Answer: A,B 

Explanation: 

A transform set combines an encryption method and an authentication method. During the IPsec security association negotiation with ISAKMP, the peers agree to use a particular transform set to protect a particular data flow. The transform set must be the same for both peers. Also, the crypto map on R2 points to the address name of VPN, which includes 172.16.0.0/16, but it should be the local subnet of 192.168.0.0/16