The actual Cisco professionals have the potential being a specialist in IT area should also reach the maximum regarding ability and accomplishment, so they really must participate in different Cisco certification exams. Cisco 400-101 named CCIE Routing and Switching (v5.0) will be stepping-stone to check the actual candidates information and capacity in the appropriate area of work. Actualtests Cisco 400-101 on the internet exercise checks can guarantee that you are able to manage these very skilled and qualified operates. Our own 400-101 exercise test offers the genuine questions, ensuring a person pass the real 400-101 test with top grades.

2021 Jun 400-101 practice exam

Q261. Which two statements are true about unicast RPF? (Choose two.) 

A. Unicast RPF requires CEF to be enabled. 

B. Unicast RPF strict mode works better with multihomed networks. 

C. Unicast RPF strict mode supports symmetric paths. 

D. Unicast RPF strict mode supports asymmetric paths. 

E. CEF is optional with Unicast RPF, but when CEF is enabled it provides better performance. 

Answer: A,C 

Explanation: 

Unicast RPF requires Cisco express forwarding (CEF) to function properly on the router. 

Strict Versus Loose Checking Mode 

The Unicast RPF in Strict Mode feature filters ingress IPv4 traffic in strict checking mode and forwards packets only if the following conditions are satisfied. 

. An IPv4 packet must be received at an interface with the best return path (route) to the packet source (a process called symmetric routing). There must be a route in the Forwarding Information Base (FIB) that matches the route to the receiving interface. Adding a route in the FIB can be done via static route, network statement, or dynamic routing. 

. IPv4 source addresses at the receiving interface must match the routing entry for the interface. 

References: 

http://www.cisco.com/c/en/us/td/docs/ios/12_2/security/configuration/guide/fsecur_c/scfrpf. html 

http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/srpf_gsr.html 


Q262. DRAG DROP 

Drag and drop the RIP configuration command on the left to the function it performs on the right. 


Answer: 



Q263. Refer to the exhibit. 


Which two conditions can cause this error message to be displayed on the console? (Choose two.) 

A. The EtherChannel is configured as desirable on both ends. 

B. The port-channel on the adjacent device is misconfigured. 

C. There is a speed and duplex mismatch on interface fa0/12. 

D. The EtherChannel is configured as auto on one of the interfaces. 

Answer: B,C 


Q264. Which three statements about IS-IS are true? (Choose three.) 

A. IS-IS is not encapsulated in IP. 

B. IS-IS is directly encapsulated in the data link layer. 

C. 0XFEFE is used in the Layer 2 header to identify the Layer 3 protocol. 

D. IS-IS uses protocol ID 93. 

E. IS-IS can be used to route the IPX protocol. 

F. IS-IS is an IETF standard. 

Answer: A,B,C 

Explanation: 

IS-IS is an Interior Gateway Protocol (IGP) for routing OSI. IS-IS packets are not encapsulated in CLNS or IP but are encapsulated directly in the data-link layer. The IS-IS protocol family is OSI, and values such as 0xFE and 0xFEFE are used by the data-link protocol to identify the Layer 3 protocol as OSI. 

Reference: http://www.cisco.com/en/US/products/ps6599/products_white_paper09186a00800a3e6f.sh tml 


Q265. Which authentication method does OSPFv3 use to secure communication between neighbors? 

A. plaintext 

B. MD5 HMAC 

C. PKI 

D. IPSec 

Answer: D 

Explanation: 

In order to ensure that OSPFv3 packets are not altered and re-sent to the device, causing the device to behave in a way not desired by its system administrators, OSPFv3 packets must be authenticated. OSPFv3 uses the IPsec secure socket API to add authentication to OSPFv3 packets. This API supports IPv6. OSPFv3 requires the use of IPsec to enable authentication. Crypto images are required to use authentication, because only crypto images include the IPsec API needed for use with OSPFv3. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_ospf/configuration/15-sy/iro-15-sy-book/ip6-route-ospfv3-auth-ipsec.html 


400-101  torrent

Replace nocs 400-101 review:

Q266. What is a reason to use DHCPv6 on a network that uses SLAAC? 

A. To get a record of the IPs that are used by the clients 

B. To push DNS and other information to the clients 

C. No reason, because there is no need for DHCPv6 when using SLAAC 

D. Because DHCPv6 can be used only in stateful mode with SLAAC to record the IPs of the clients 

E. Because DHCPv6 can be used only in stateless mode with SLAAC to record the IPs of the clients 

F. Because DHCPv6 is required to use first-hop security features on the switches 

Answer: B 

Explanation: 

SLAAC is by far the easiest way to configure IPv6 addresses, simply because you don’t have to configure any IPv6 address. With SLAAC, a host uses the IPv6 Neighbor Discovery Protocol (NDP) to determine its IP address and default routers. Using SLAAC, a host requests and listens for Router Advertisements (RA) messages, and then taking the prefix that is advertised to form a unique address that can be used on the network. For this to work, the prefix that is advertised must advertise a prefix length of 64 bits (i.e., /64). But the most significant of Stateless Address Autoconfiguration (SLAAC) is it provided no mechanism for configuring DNS resolver information.Therefore SLACC can be used along with DHCPv6 (Stateless) to push DNS and other information to the clients. 


Q267. DRAG DROP 

Drag and drop each step of the Unicast RPF process on the left into the correct order on the right. 


Answer: 



Q268. DRAG DROP 

Drag and drop each step in the performance-monitoring configuration process on the left into the correct order on the right. 


Answer: 



Q269. Which two statements about BGP loop prevention are true? (Choose two.) 

A. Advertisements from PE routers with per-neighbor SOO configured include a Site of Origin value that is equal to the configured value of the BGP peering. 

B. If the configured Site of Origin value of a BGP peering is equal to the Site of Origin value on a route it receives, route advertisement is blocked to prevent a route loop. 

C. AS-override aids BGP loop prevention, but alternate loop prevention mechanisms are also necessary. 

D. Advertisements from the neighbors a BGP peering include a Site of Origin value that is separate from the configured value of the BGP peering. 

E. If the configured Site of Origin value of a BGP peering is greater than the Site of Origin value on a route it receives, route advertisement is blocked to prevent a route loop. 

F. If the configured Site of Origin value of a BGP peering is equal to the Site of Origin value on a route it receives, route advertisement is permitted. 

Answer: A,B 


Q270. Refer to the exhibit. 


At which location will the benefit of this configuration be observed? 

A. on Router A and its upstream routers B. on Router A and its downstream routers 

C. on Router A only 

D. on Router A and all of its ARP neighbors 

Answer: B 

Explanation: 

The following example shows how to configure the router (and downstream routers) to drop all options packets that enter the network: Router(config)# ip options drop 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/sel_drop.html