Pass4sure offers free demo for 400 101 pdf exam. "CCIE Routing and Switching (v5.0)", also known as 400 101 vce exam, is a Cisco Certification. This set of posts, Passing the Cisco ccie 400 101 exam, will help you answer those questions. The 400 101 pdf Questions & Answers covers all the knowledge points of the real exam. 100% real Cisco 400 101 dumps exams and revised by experts!

Q31. Refer to the exhibit. 

How many EIGRP routes will appear in the routing table of R2? 

A. 0 

B. 1 

C. 2 

D. 3 



EIGRPv6 on R2 was shut down so there is no EIGRP routes on the routing table of R2. If we turn on EIGRPv6 on R2 (with “no shutdown” command) then we would see the prefix of the loopback interface of R1 in the routing table of R2. 

Note. EIGRPv6 requires the “ipv6 unicast-routing” global command to be turned on first or it will not work. 

Q32. Refer to the exhibit. 

Router 1 and Router 2 use HSRP to provide first hop redundancy for hosts on the network. 

Which feature can provide additional failover coverage for the PC? 

A. Cisco Express Forwarding 

B. NetFlow 

C. Accounting 

D. Enhanced Object Tracking 



HSRP has a mechanism for tracking the interface line-protocol state. The enhanced object tracking feature separates the tracking mechanism from HSRP. It creates a separate, standalone tracking process that can be used by processes other than HSRP. This feature allows tracking of other objects in addition to the interface line-protocol state. A client process, such as HSRP, can register an interest in tracking objects and request notification when the tracked object changes state. Several clients can track the same object, and can take different actions when the object changes state. This feature increases the availability and speed of recovery of a router system and decreases outages and outage duration. 


Q33. What is the most efficient way to confirm whether microbursts of traffic are occurring? 

A. Monitor the output traffic rate using the show interface command. 

B. Monitor the output traffic rate using the show controllers command. 

C. Check the CPU utilization of the router. 

D. Sniff the traffic and plot the packet rate over time. 



Micro-bursting is a phenomenon where rapid bursts of data packets are sent in quick succession, leading to periods of full line-rate transmission that can overflow packet buffers of the network stack, both in network endpoints and routers and switches inside the network. In order to troubleshoot microbursts, you need a packet sniffer that can capture traffic over a long period of time and allow you to analyze it in the form of a graph which displays the saturation points (packet rate during microbursts versus total available bandwidth). You can eventually trace it to the source causing the bursts (e.g. stock trading applications). 

Reference: Adam, Paul (2014-07-12). All-in-One CCIE V5 Written Exam Guide (Kindle Locations 989-994). Kindle Edition. 

Q34. Which three steps are necessary to enable SSH? (Choose three.) 

A. generating an RSA or DSA cryptographic key 

B. configuring the version of SSH 

C. configuring a domain name 

D. configuring VTY lines for use with SSH 

E. configuring the port for SSH to listen for connections 

F. generating an AES or SHA cryptographic key 

Answer: A,C,D 


Here are the steps: 

1. Configure a hostname for the router using these commands. 

yourname#configure terminal 

Enter configuration commands, one per line. End with CNTL/Z. 

yourname (config)#hostname LabRouter 


2. Configure a domain name with the ip domain-name command followed by whatever you would like your domain name to be. I used 

LabRouter(config)#ip domain-name 

3. We generate a certificate that will be used to encrypt the SSH packets using the crypto key generate rsa command. 

Take note of the message that is displayed right after we enter this command. “The name for the keys will bE.” — it combines the hostname of the router along with the domain name we configured to get the name of the encryption key generated; this is why it was important for us to, first of all, configure a hostname then a domain name before we generated the keys. 

Notice also that it asks us to choose a size of modulus for the key we’re about to generate. 

The higher the modulus, the stronger the encryption of the key. For our example, we’ll use a modulus of 1024. 

Q35. Which two 802.1D port states are expected in a stable Layer 2 network? (Choose two.) 

A. forwarding 

B. learning 

C. listening 

D. blocking 

E. disabled 

Answer: A,D 

Q36. What is the purpose of EIGRP summary leaking? 

A. to allow a summary to be advertised conditionally on specific criteria 

B. to allow a component of a summary to be advertised in addition to the summary 

C. to allow overlapping summaries to exist on a single interface 

D. to modify the metric of the summary based on which components of the summary are operational 



When you do manual summarization, and still you want to advertise some specific routes to the neighbor, you can do that using leak-map. Please read more about leaking routes here. html#wp1037685. 

Q37. A floating static route appears in the routing table of an interface even when the interface is unusable. 

Which action can you take to correct the problem? 

A. Remove the permanent option from the static route. 

B. Correct the administrative distance. 

C. Configure the floating static route to point to another route in the routing table. 

D. Correct the DHCP-provided route on the DHCP server. 


Q38. Which two options are benefits of EIGRP OTP? (Choose two.) 

A. It allows EIGRP routers to peer across a service provider without the service provider involvement. 

B. It allows the customer EIGRP domain to remain contiguous. 

C. It requires only minimal support from the service provider. 

D. It allows EIGRP neighbors to be discovered dynamically. 

E. It fully supports multicast traffic. 

F. It allows the administrator to use different autonomous system numbers per EIGRP domain. 

Answer: A,B 


EIGRP Over the Top (OTP) allows EIGRP routers to peer across a service provider infrastructure without the SP’s involvement. In fact with OTP, the provider won’t see customer routes at all. EIGRP OTP acts as a provider-independent overlay that transports customer data between the customer’s routers. To the customer, the EIGRP domain is contiguous. A customer’s EIGRP router sits at the edge of the provider cloud, and peers with another EIGRP router a different location across the cloud. Learned routes feature a next hop of the customer router — not the provider. Good news for service providers is that customers can deploy EIGRP OTP with their involvement 


Q39. Which two options are the two underlying protocols on which a DMVPN relies? (Choose two.) 

A. IPsec 






Answer: A,B 

Q40. While troubleshooting an issue for a remote user, you must capture the communication between the user's computer and a server at your location. The traffic passes through a Cisco IOS-XE capable switch. Which statement about obtaining the capture is true? 

A. The Embedded Packet Capture application in the IOS-XE Software can capture the packets, but there is a performance impact. 

B. The Embedded Packet Capture application in the IOS-XE Software can capture the packets without impacting performance. 

C. The Mini Protocol Analyzer embedded in the IOS-XE Software can capture the packets without impacting performance. 

D. The Mini Protocol Analyzer embedded in the IOS-XE Software can be used to capture the packets, but there is a performance impact. 

E. Wireshark can capture packets through a SPAN port, but there is a performance impact.