Cisco qualification may be the earths most authoritative global qualification. Thus 400-101 is extremely required for those people who are nervous to enter the particular IT company. But it is extremely tough for those who are active working or learning to pass the particular CCIE Routing and Switching (v5.0) examination. Ucertify Cisco 400-101 examine instructions can help you preserving a large amount of period,energy as well as resource within the 400-101 examination. Youll be able to handle this 400-101 examination successfully by the 400-101 pdf as well as examination powerplant. We are able to keep your item on time and let individuals to discover Cisco information very easily. You can even obtain the particular Cisco 400-101 pdf demo version totally free.

2021 Jun 400-101 practice

Q481. Which two statements about EIGRP load balancing are true? (Choose two.) 

A. EIGRP supports 6 unequal-cost paths. 

B. A path can be used for load balancing only if it is a feasible successor. 

C. EIGRP supports unequal-cost paths by default. 

D. Any path in the EIGRP topology table can be used for unequal-cost load balancing. 

E. Cisco Express Forwarding is required to load-balance across interfaces. 

Answer: A,B 


Q482. Which statement about BGP and diverse path advertisement is true? 

A. The BGP best-path selection must be disabled. 

B. The BGP best-path selection algorithm has been changed to always ignore the IGP metric. 

C. The BGP best-path selection algorithm has been changed so that two BGP paths can be flagged as best in the BGP table. 

D. The BGP best-path selection algorithm has not been changed. 

E. The BGP best-path selection is disabled for BGP routes for which the feature is enabled. 

Answer: D 

Explanation: 

The BGP Diverse Path Using a Diverse-Path Route Reflector feature allows BGP to distribute an alternative path other than the best path between BGP speakers when route reflectors are deployed. This additional path is added to the best-path, and the best path algorithm still remains unchanged. 


Q483. A configuration includes the line ip nbar port-map SSH tcp 22 23 443 8080. Which option describes the effect of this configuration line? 

A. It configures NBAR to search for SSH using ports 22, 23, 443, and 8080. 

B. It configures NBAR to allow SSH connections only on ports 22, 23, 443, and 8080. 

C. It enables NBAR to inspect for SSH connections. 

D. It creates a custom NBAR port-map named SSH and associates TCP ports 22, 23, 443, and 8080 to itself. 

Answer: A 

Explanation: 

The ip nbar-port-map command configures NBAR to search for a protocol or protocol name using a port number other than the well-known port. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/qos/command/reference/fqos_r/qrfcmd10.pd f 


Q484. Refer to the exhibit. 


Service provider SP 1 is running the MPLS-VPN service. The MPLS core network has MP-BGP configured with RR-1 as route reflector. What will be the effect on traffic between PE1 and PE2 if router P1 goes down? 

A. No effect, because all traffic between PE1 and PE2 will be rerouted through P2. 

B. No effect, because P1 was not the only P router in the forwarding path of traffic. 

C. No effect, because RR-1 will find an alternative path for MP-BGP sessions to PE-1 and PE-2. 

D. All traffic will be lost because RR-1 will lose the MP-BGP sessions to PE-1 and PE-2. 

Answer: D 

Explanation: 

If the connection to the route reflector goes down, then routes from PE-1 will not get advertised to PE2, and vice versa. Route reflectors are critical in an MPLS VPN such as the one shown, which is why it is a best practice to have multiple route reflectors in this kind of network. 


Q485. Which IPv6 tunneling type establishes a permanent link between IPv6 domains over IPv4? 

A. IPv4-compatible tunneling 

B. ISATAP tunneling 

C. 6to4 tunneling 

D. manual tunneling 

Answer: D 

Explanation: 

A manually configured tunnel is equivalent to a permanent link between two IPv6 domains over an IPv4 backbone. The primary use is for stable connections that require regular secure communication between two edge routers or between an end system and an edge router, or for connection to remote IPv6 networks. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/ipv6/configuration/guide/12_4t/ipv6_12_4t_book/i p6-tunnel.html 


2passeasy.com

Most up-to-date avenida armando lombardi 400. lojas 101-105:

Q486. You are implementing new addressing with EIGRP routing and must use secondary addresses, which are missing from the routing table. Which action is the most efficient solution to the problem? 

A. Disable split-horizon on the interfaces with secondary addresses. 

B. Disable split-horizon inside the EIGRP process on the router with the secondary interface addresses. 

C. Add additional router interfaces and move the secondary addresses to the new interfaces. 

D. Use a different routing protocol and redistribute the routes between EIGRP and the new protocol. 

Answer: A 

Explanation: 

Normally, routers that are connected to broadcast-type IP networks and that use distance-vector routing protocols employ the split horizon mechanism to reduce the possibility of routing loops. Split horizon blocks information about routes from being advertised by a router out of any interface from which that information originated. This behavior usually optimizes communications among multiple routers, particularly when links are broken. However, with nonbroadcast networks, situations can arise for which this behavior is less than ideal. For these situations, you might want to disable split horizon with EIGRP and RIP. If an interface is configured with secondary IP addresses and split horizon is enabled, updates might not be sourced by every secondary address. One routing update is sourced per network number unless split horizon is disabled. 

Reference: 

http://www.cisco.com/c/en/us/td/docs/ios/12_2/ip/configuration/guide/fipr_c/1cfrip.html 


Q487. Which two statements about the OSPF two-way neighbor state are true? (Choose two.) 

A. Each neighbor receives its own router ID in a hello packet from the other neighbor. 

B. Each neighbor receives a hello message from the other neighbor. 

C. It is valid only on NBMA networks. 

D. It is valid only on point-to-point networks. 

E. Each neighbor receives an acknowledgement of its own hello packet from the other neighbor. 

F. Each neighbor receives the router ID of the other neighbor in a hello packet from the other neighbor. 

Answer: A,E 


Q488. DRAG DROP 

Drag and drop the OSPF network type on the left to the correct traffic type category on the right. 


Answer: 



Q489. Which TCP mechanism prevents the sender from sending data too quickly for the receiver to process? 

A. Congestion control 

B. Error detection 

C. Selective acknowledgement 

D. Flow control 

Answer: D 

Explanation: 

In data communications, flow control is the process of managing the rate of data transmission between two nodes to prevent a fast sender from overwhelming a slow receiver. It provides a mechanism for the receiver to control the transmission speed, so that the receiving node is not overwhelmed with data from transmitting node. 

Reference: http://en.wikipedia.org/wiki/Flow_control_(data) 


Q490. Which two statements about the max-age time in IS-IS are true? (Choose two.) 

A. The IS-IS max-age time is 20 minutes by default. 

B. The IS-IS max-age time is 60 minutes by default. 

C. The IS-IS max-age time increments from zero to max-age. 

D. The IS-IS max-age time decrements from max-age to zero. 

Answer: A,D