Ucertify 400-101 CCIE Routing and Switching (v5.0) practice check will be the most suitable choice that you should plan for the particular Cisco exam. In order to be described as a preeminent Ucertify technical engineers, you can not pass by the particular Ucertify 400-101 CCIE Routing and Switching (v5.0) materials supply. Learn not merely the true 400-101 check questions and also the detailed reason. Moving Cisco 400-101 certification is actually the first most important thing, moreover, you can learn several specialised understanding and activities that will found in not able to practice work.

2021 Jul 400-101 ccie written exam price:

Q11. Which two statements about device access control are true? (Choose two.) 

A. The AUX port is displayed as type tty in the output of the show line command. 

B. VTY lines are associated with physical interfaces on a network device. 

C. MPP restricts device-management access to interfaces that are configured under the control plane host configuration. 

D. The enable password command sets an MD5 one-way encrypted password. 

E. The console port supports hardware flow control 

Answer: C,E 

Q12. Which two options are reasons for TCP starvation? (Choose two.) 

A. The use of tail drop 

B. The use of WRED 

C. Mixing TCP and UDP traffic in the same traffic class 

D. The use of TCP congestion control 

Answer: C,D 


It is a general best practice to not mix TCP-based traffic with UDP-based traffic (especially Streaming-Video) within a single service-provider class because of the behaviors of these protocols during periods of congestion. Specifically, TCP transmitters throttle back flows when drops are detected. Although some UDP applications have application-level windowing, flow control, and retransmission capabilities, most UDP transmitters are completely oblivious to drops and, thus, never lower transmission rates because of dropping. When TCP flows are combined with UDP flows within a single service-provider class and the class experiences congestion, TCP flows continually lower their transmission rates, potentially giving up their bandwidth to UDP flows that are oblivious to drops. This effect is called TCP starvation/UDP dominance. TCP starvation/UDP dominance likely occurs if (TCP-based) Mission-Critical Data is assigned to the same service-provider class as (UDP-based) Streaming-Video and the class experiences sustained congestion. Even if WRED or other TCP congestion control mechanisms are enabled on the service-provider class, the same behavior would be observed because WRED (for the most part) manages congestion only on TCP-based flows. 

Reference: http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/WAN_and_MAN/QoS_SRND/Qo S-SRND-Book/VPNQoS.html 


Drag and drop the method for refreshing BGP prefixes on the left to the corresponding description on the right. 


Q14. Refer to the exhibit. 

Which IP packets will be accepted from EBGP neighbor 

A. IP packets with a TTL count in the header that is equal to or greater than 253 

B. IP packets with a TTL count in the header that is equal to 253 

C. IP packets with a TTL count in the header that is equal to or greater than 2 

D. IP packets with a TTL count in the header that is equal to 2 

Answer: A 


neighbor ip-address ttl-security hops hop-count 


Router(config-router)# neighbor ttl-security hops 2 

Configures the maximum number of hops that separate two peers. 

. The hop-count argument is set to number of hops that separate the local and remote peer. 

If the expected TTL value in the IP packet header is 254, then the number 1 should be configured for the hop-count argument. The range of values is a number from 1 to 254. 

. When this feature is enabled, BGP will accept incoming IP packets with a TTL value that is 

equal to or greater than the expected TTL value. Packets that are not accepted are silently discarded. 

. The example configuration sets the expected incoming TTL value to at least 253, which is 255 minus the TTL value of 2, and this is the minimum TTL value expected from the BGP peer. The local router will accept the peering session from the neighbor only if it is 1 or 2 hops away. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2s/feature/guide/fs_btsh.html 

Q15. Which two options are ways in which an OSPFv3 router handles hello packets with a clear address-family bit? (Choose two.) 

A. IPv4 unicast packets are discarded. 

B. IPv6 unicast packets are discarded. 

C. IPv4 unicast packets are forwarded. 

D. IPv6 unicast packets are forwarded. 

Answer: A,D 


A typical distance vector protocol saves the following information when computing the best path to a destination: the distance (total metric or distance, such as hop count) and the vector (the next hop). For instance, all the routers in the network in Figure 1 are running Routing Information Protocol (RIP). Router Two chooses the path to Network A by examining the hop count through each available path. 

Since the path through Router Three is three hops, and the path through Router One is two hops, Router Two chooses the path through One and discards the information it learned through Three. If the path between Router One and Network A goes down, Router Two loses all connectivity with this destination until it times out the route of its routing table (three update periods, or 90 seconds), and Router Three re-advertises the route (which occurs every 30 seconds in RIP). Not including any hold-down time, it will take between 90 and 120 seconds for Router Two to switch the path from Router One to Router Three. EIGRP, instead of counting on full periodic updates to re-converge, builds a topology table from each of its neighbor's advertisements (rather than discarding the data), and converges by either looking for a likely loop-free route in the topology table, or, if it knows of no other route, by querying its neighbors. Router Two saves the information it received from both Routers One and Three. It chooses the path through One as its best path (the successor) and the path through Three as a loop-free path (a feasible successor). When the path through Router One becomes unavailable, Router Two examines its topology table and, finding a feasible successor, begins using the path through Three immediately. 

Reference: http://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/16406-eigrp-toc.html 

400-101  testing engine

Avant-garde ccie dumps 400-101:

Q16. Refer to the exhibit. 

Which action will solve the error state of this interface when connecting a host behind a Cisco IP phone? 

A. Configure dot1x-port control auto on this interface 

B. Enable errdisable recovery for security violation errors 

C. Enable port security on this interface 

D. Configure multidomain authentication on this interface 

Answer: D 


In single-host mode, a security violation is triggered when more than one device are detected on the data vlan. In multidomain authentication mode, a security violation is triggered when more than one device are detected on the data or voice VLAN. Here we see that single host mode is being used, not multidomain mode. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/50sg/configuration/guide/Wrapper-46SG/dot1x.html#wp1309041 

Q17. Refer to the exhibit. 

Which route type is displayed when you enter the command show ip route supernets-only on a device with this configuration? 

A. Connected 




E. An empty route set 

Answer: E 


This command shows supernets only; it does not show subnets. In this case, the routing table would contain the subnet, but not the supernet. 

Q18. In which type of EIGRP configuration is EIGRP IPv6 VRF-Lite available? 

A. stub 

B. named mode 

C. classic mode 

D. passive 

Answer: B 


The EIGRP IPv6 VRF Lite feature provides EIGRP IPv6 support for multiple VRFs. EIGRP for IPv6 can operate in the context of a VRF. The EIGRP IPv6 VRF Lite feature provides 

separation between routing and forwarding, providing an additional level of security because no communication between devices belonging to different VRFs is allowed unless it is explicitly configured. The EIGRP IPv6 VRF Lite feature simplifies the management and troubleshooting of traffic belonging to a specific VRF. The EIGRP IPv6 VRF Lite feature is available only in EIGRP named configurations. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/configuration/15-2mt/ipv6-15-2mt-book/ip6-eigrp.html#GUID-92B4FF4F-2B68-41B0-93C8-AAA4F0EC1B1B 

Q19. How is the MRU for a multilink bundle determined? 

A. It is negotiated by LCP. 

B. It is manually configured on the multilink bundle. 

C. It is manually configured on all physical interfaces of a multilink bundle. 

D. It is negotiated by NCP. 

E. It is negotiated by IPCP. 

Answer: A 

Q20. Which two features improve BGP convergence? (Choose two.) 

A. next-hop address tracking 

B. additional paths 

C. advertise map 

D. communities 

E. soft reconfiguration 

Answer: A,B 


The BGP Support for Next-Hop Address Tracking feature is enabled by default when a supporting Cisco software image is installed. BGP next-hop address tracking is event driven. BGP prefixes are automatically tracked as peering sessions are established. Next-hop changes are rapidly reported to the BGP routing process as they are updated in the RIB. This optimization improves overall BGP convergence by reducing the response time to next-hop changes for routes installed in the RIB. When a best path calculation is run in between BGP scanner cycles, only next-hop changes are tracked and processed. BGP routers and route reflectors (RRs) propagate only their best path over their sessions. The advertisement of a prefix replaces the previous announcement of that prefix (this behavior is known as an implicit withdraw). The implicit withdraw can achieve better scaling, but at the cost of path diversity. Path hiding can prevent efficient use of BGP multipath, prevent hitless planned maintenance, and can lead to MED oscillations and suboptimal hot-potato routing. Upon nexthop failures, path hiding also inhibits fast and local recovery because the network has to wait for BGP control plane convergence to restore traffic. The BGP Additional Paths feature provides a generic way of offering path diversity; the Best External or Best Internal features offer path diversity only in limited scenarios. The BGP Additional Paths feature provides a way for multiple paths for the same prefix to be advertised without the new paths implicitly replacing the previous paths. Thus, path diversity is achieved instead of path hiding. 

References: http://www.cisco.com/en/US/docs/ios-xml/ios/iproute_bgp/configuration/15-1sg/irg-nexthop-track.html http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bgp/configuration/xe-3s/irg-xe-3s-book/bgp_additional_paths.html