Proper study guides for Most up-to-date Cisco CCIE Routing and Switching (v5.0) certified begins with Cisco 400 101 ccie preparation products which designed to deliver the Vivid 400 101 ccie questions by making you pass the 400 101 vce test at your first time. Try the free ccie 400 101 dumps demo right now.

Q1. Which two statements about port ACLs are true? (Choose two.) 

A. Port ACLs are supported on physical interfaces and are configured on a Layer 2 interface on a switch. 

B. Port ACLs support both outbound and inbound traffic filtering. 

C. When it is applied to trunk ports, the port ACL filters only native VLAN traffic. 

D. When it is applied to a port with voice VLAN, the port ACL filters both voice and data VLAN traffic. 

Answer: A,D 

Explanation: 

PACLs filter incoming traffic on Layer 2 interfaces, using Layer 3 information, Layer 4 header information, or non-IP Layer 2 information The port ACL (PACL) feature provides the ability to perform access control on specific Layer 2 ports. A Layer 2 port is a physical LAN or trunk port that belongs to a VLAN. Port ACLs perform access control on all traffic entering the specified Layer 2 port, including voice and data VLANs that may be configured on the port. Port ACLs are applied only on the ingress traffic. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SY/configuration/guide/sy_swcg/port_acls.html 


Q2. Refer to the exhibit. 

Which statement about this IP SLA is true? 

A. The SLA must also have a schedule configured before it will start. 

B. The TTL of the SLA packets is 10. 

C. The SLA has a timeout of 3.6 seconds. 

D. The SLA has a lifetime of 5 seconds. 

Answer:

Explanation: 

When you configure an IP SLAs operation, you must schedule the operation to begin capturing statistics and collecting error information. You can schedule an operation to start immediately or to start at a certain month, day, and hour. You can use the pending option to set the operation to start at a later time. The pending option is an internal state of the operation that is visible through SNMP. The pending state is also used when an operation is a reaction (threshold) operation waiting to be triggered. You can schedule a single IP SLAs operation or a group of operations at one time. We can see in this output that the IP SLA is still in a pending trigger state. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/44sg/configuration/guide/Wrapper-44SG/swipsla.html 


Q3. Which address is a MAC address that is mapped from an IPv6 address (RFC 2464)? 

A. 3333.FF17.FC0F 

B. FFFE. FF17.FC0F 

C. FF34.3333.FF17 

D. FF7E.FF17.FC0F 

Answer:

Explanation: 

An IPv6 packet with a multicast destination address DST, consisting of the sixteen octets DST through DST, is transmitted to the Ethernet multicast address whose first two octets are the value 3333 hexadecimal and whose last four octets are the last four octets of DST. 

Reference: https://tools.ietf.org/html/rfc2464 


Q4. Which ICMP message type is used to assist path MTU discovery? 

A. destination unreachable 

B. redirect message 

C. source quench 

D. time exceeded 

Answer:


Q5. Refer to the exhibit. 

Which three statements about the device with this configuration are true? (Choose three.) 

A. Multiple AFIs are configured on the device. 

B. The authentication on 172.16.129.7 is configured incorrectly. 

C. The device is configured to support MPLS VPNs. 

D. This device is configured with a single AFI. 

E. The authentication on 172.16.129.4 is configured incorrectly. 

F. The device is configured to support L2VPNs. 

Answer: A,B,C 


Q6. Refer to the exhibit. 

Your network is suffering excessive output drops. Which two actions can you take to resolve the problem? (Choose two.) 

A. Install a switch with larger buffers. 

B. Configure a different queue set. 

C. Reconfigure the switch buffers. 

D. Configure the server application to use TCP. 

E. Update the server operating system. 

Answer: A,B 

Explanation: 

Installing a switch with larger buffers and correctly configuring the buffers can solve output queue problems. 

For each queue we need to configure the assigned buffers. The buffer is like the ‘storage’ space for the interface and we have to divide it among the different queues. This is how to do it: 

mls qos queue-set output <queue set> buffers Q1 Q2 Q3 Q4 

In this example, there is nothing hitting queue 2 or queue 3 so they are not being utilized. 


Q7. How does having an EIGRP feasible successor speed up convergence? 

A. EIGRP sends queries only if there is a feasible successor, which decreases the number of routers that are involved in convergence. 

B. EIGRP sends queries only if there is not a feasible successor, which causes less control traffic to compete with data. 

C. EIGRP immediately installs the loop-free alternative path in the RIB. 

D. EIGRP preinstalls the feasible successor in the RIB in all cases, which causes traffic to switch more quickly. 

Answer:

Explanation: 

Feasible Successor 

. A next-hop router that serves as backup to the current successor. 

. The condition is that the said router’s AD (or RD) is less than the FD of the current successor route. 

. Once the feasible successor is selected, they are placed in the topology table. If a change in topology occurs which requires a new route, DUAL looks for the feasible successor and uses it as new route immediately, resulting in fast convergence. 

Reference: http://routemyworld.com/2008/07/page/2/ 


Q8. Which field is specific to the OPSFv3 packet header, as opposed to the OSPFv2 packet header? 

A. checksum 

B. router ID 

C. AuType 

D. instance ID 

Answer:

Explanation: 

In OSPFv3, Instance ID is a new field that is used to have multiple OSPF process’ instance per link. By default it is 0 and for any additional instance it is increased, instance ID has local link significance only. OSPFv3 routers will only become neighbors if the instanceIDs match. It is thus possible to have multiple routers on a broadcast domain and all run Ospfv3 but not all of them becoming neighbors. 

Reference: https://supportforums.cisco.com/document/97766/comparing-ospfv3-ospfv2-routing-protocol 


Q9. Which technology is not necessary to set up a basic MPLS domain? 

A. IP addressing 

B. an IGP 

C. LDP or TDP 

D. CEF 

E. a VRF 

Answer:

Explanation: 

The simplest form of VRF implementation is VRF Lite. In this implementation, each router within the network participates in the virtual routing environment in a peer-based fashion. While simple to deploy and appropriate for small to medium enterprises and shared data centres, VRF Lite does not scale to the size required by global enterprises or large carriers, as there is the need to implement each VRF instance on every router, including intermediate routers. VRFs were initially introduced in combination with MPLS, but VRF proved to be so useful that it eventually evolved to live independent of MPLS. This is the historical explanation of the term VRF Lite. Usage of VRFs without MPLS. 

Reference: http://en.wikipedia.org/wiki/Virtual_routing_and_forwarding 


Q10. Which two tunneling techniques determine the IPv4 destination address on a per-packet basis? (Choose two.) 

A. 6to4 tunneling 

B. ISATAP tunneling 

C. manual tunneling 

D. GRE tunneling 

Answer: A,B 

Explanation: Tunnel Configuration Parameters by Tunneling Type 

Tunneling Type 

Tunnel Configuration Parameter 

Tunnel Mode 

Tunnel Source 

Tunnel Destination 

Interface Prefix or Address 

Manual 

ipv6ip 

An IPv4 address, or a reference to an interface on which IPv4 is configured. 

An IPv4 address. 

An IPv6 address. 

GRE/IPv4 

gre ip 

An IPv4 address. 

An IPv6 address. 

IPv4-compatible 

ipv6ip auto-tunnel 

Not required. These are all point-to-multipoint tunneling types. The IPv4 destination address is calculated, on a per-packet basis, from the IPv6 destination. 

Not required. The interface address is generated as ::tunnel-source/96. 

6to4 

ipv6ip 6to4 

An IPv6 address. The prefix must embed the tunnel source IPv4 address 

ISATAP 

ipv6ip isatap 

An IPv6 prefix in modified eui-64 format. The IPv6 address is generated from the prefix and the tunnel source IPv4 address. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/ipv6/configuration/guide/12_4t/ipv6_12_4t_book/i p6-tunnel.html