We promise that you may get with the Cisco Cisco exam with ease. Our experienced professionals are devoted in order to updating the Cisco 400-101 exam dumps. It is possible to keep faith throughout us and we provide 100% money rear. If you have something wrong with our 400-101 practice merchandise, please contact us timely. We now have 24/7 customer program.

2021 Nov ccie written dumps 400-101:

Q501. Refer to the exhibit. 

Which part of the joined group addresses list indicates that the interface has joined the EIGRP multicast group address? 

A. FF02::1 

B. FF02::1:FF00:200 

C. FF02::A 

D. FF02::2 



FF02::A is an IPv6 link-local scope multicast addresses. This address is for all devices on a wire that want to "talk" EIGRP with one another. 

Focusing specifically on FF02::A and how routers join it, we can see and say three things: 

. Local: FF02::A is local to the wire. 

. Join: Each device "joins" FF02::A by just "deciding to listen" to the IPv6 link-local scope multicast address FF02::A. Then, by extension, it listens to the corresponding MAC address for that multicast IPv6 address (33:33:00:00:00:0A). 

. Common interest: As we can see, these varying groups have something in common that they would all like to hear about. For FF02::A, the common interest --the "connection" among the devices joining that group – is that they all want to listen to or participate in EIGRP. 

Reference: http://www.networkcomputing.com/networking/understanding-ipv6-what-is-solicited-node-multicast/a/d-id/1315703 

Q502. Refer to the exhibit. 

Which statement is true? 

A. R2 is directly connected to the receiver for this group and is the winner of an assert mechanism. 

B. R2 is directly connected to the receiver for this group, and it forwards the traffic onto Ethernet3/0, but it is forwarding duplicate traffic onto Ethernet3/0. 

C. R2 has the A flag (Accept flag) set on Ethernet 3/0. This is fine, since the group is in BIDIR-PIM mode. 

D. R2 is directly connected to the receiver for this group and is the loser of an assert mechanism. 

E. The A flag is set until the SPT threshold is reached for this multicast group. 



show ip mroute Field Descriptions 



RPF neighbor or RPF nbr 

IP address of the upstream router to the source. Tunneling indicates that this router is sending data to the RP encapsulated in register packets. The hexadecimal number in parentheses indicates to which RP it is registering. Each bit indicates a different RP if multiple RPs per group are used. If an asterisk (*) appears after the IP address in this field, the RPF neighbor has been learned through an assert. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/ipmulti/command/reference/fiprmc_r/1rfmult 3.html 

Q503. Which two statements about class maps are true? (Choose two.) 

A. As many as eight DSCP values can be included in a match dscp statement. 

B. The default parameter on a class map with more than one match command is match-any. 

C. The match class command can nest a class map within another class map. 

D. A policy map can be used to designate a protocol within a class map. 

Answer: A,C 


Answer A. 

Router(config-cmap)# match [ip] dscp dscp-value [dscp-value dscp-value dscp-value 

dscp-value dscp-value dscp-value dscp-value] 

(Optional) Identifies a specific IP differentiated service code point (DSCP) value as a match criterion. Up to eight DSCP values can be included in one match statement. 

Answer C. 

Router config-cmap)# match class-map class-name (Optional) Specifies the name of a traffic class to be used as a matching criterion (for nesting traffic class [nested class maps] within one another). 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/qos/configuration/guide/fqos_c/qcfmcli2.html 

Q504. When you implement CoPP on your network, what is its default action? 

A. permit all traffic 

B. rate-limit bidirectional traffic to the control plane 

C. drop management ingress traffic to the control plane 

D. monitor ingress and egress traffic to the control plane by using access groups that are applied to the interface 

E. block all traffic 


Q505. What are two advantages to using Asynchronous mode instead of Demand mode for BFD? (Choose two.) 

A. Asynchronous mode requires half as many packets as Demand mode for failure detection. 

B. Asynchronous mode can be used in place of the echo function. 

C. Asynchronous mode supports a larger number of BFD sessions. 

D. Asynchronous mode requires one fourth as many packets as Demand mode for failure detection. 

E. Asynchronous mode’s round-trip jitter is less than that of Demand mode. 

Answer: A,B 


Pure Asynchronous mode is advantageous in that it requires half as many packets to achieve a particular Detection Time as does the Echo function. It is also used when the Echo function cannot be supported for some reason. 

Reference: https://tools.ietf.org/html/rfc5880 

Down to date ccie dumps 400-101:

Q506. Refer to the exhibit. 

Which statement about the output is true? 

A. The flow is an HTTPS connection to the router, which is initiated by 

B. The flow is an HTTP connection to the router, which is initiated by 

C. The flow is an HTTPS connection that is initiated by the router and that goes to 

D. The flow is an HTTP connection that is initiated by the router and that goes to 



We can see that the connection is initiated by the Source IP address shown as We also see that the destination protocol (DstP) shows 01BB, which is in hex and translates to 443 in decimal. SSL/HTTPS uses port 443. 

Q507. Refer to the exhibit. 

With these configurations for R1 and R2, which statement about PPP authentication is true? 

A. Authentication fails because R1 is missing a username and password. 

B. R2 responds with the correct authentication credentials. 

C. R2 requires authentication from R1. 

D. R1 requires authentication from R2. 



Only R2 is configured with the “PPP authentication PAP” command so it requires authentication from R1, but R1 does not require authentication from R2. 

Q508. Which statement about passive interfaces is true? 

A. The interface with the OSPF passive interface configuration appears as a not-so-stubby network. 

B. The interface with the EIGRP passive interface configuration ignores routes after the exchange of hello packets. 

C. The interface with the IS-IS passive interface configuration sends the IP address of that interface in the link-state protocol data units. 

D. Passive interface can be configured on the interface for IS-IS. 



With IS-IS, passive interfaces are used to prevent unnecessary LSA packets out that interface, but the IP address of passive interfaces are still included in updates going out the other interfaces. This behavior is what enables the best practice of configuring loopback interfaces as passive, but still having the loopback be reachable. 

Q509. Which three message types are used for prefix delegation in DHCPv6? (Choose three.) 

A. DHCP Discover 

B. Renew 

C. Solicit 

D. DHCP Offer 

E. Advertise 

F. DHCP Ack 

Answer: B,C,E 


DHCPv6 Message Types 

For a client to get an IPv6 address successfully from a DHCPv6 server, the Client-Server Conversation happens using the following messages. 

Client--->Server Messages 

Server--->Client Messages 

Solicit, Request, Confirm, Renew, Rebind, Release, Decline, Information-Request Advertise, Reply, Reconfigure 

Lets look at each message types in detail: 


This is the first step in DHCPv6, where a DHCPv6 client sends a Solicit message to locate DHCPv6 servers. 


Upon receiving a Solicit Message from the client, the DHCPv6 server sends an Advertise message to indicate that it is available for DHCP service, in response to a Solicit message received from a client. 


This message is sent by the DHCPv6 client.Client sends a Request message to request configuration parameters which includes IP addresses or delegated prefixes, from a specific server. 


Confirm message is sent by the client to any available server in the network to confirm that the client is still on the same link or it has to be removed. This message also confirms the IPv6 addresses that are assigned to the link are still valid. This could happen in case when a client detects a change in link-layer connectivity or if the device is powered on and it is found that one or more leases are still valid. Note that only the prefix portion of the addresses are validated and not the actual leases. 


A client sends a Renew message to the server when it wants to extend the lifetimes on the addresses and other configuration parameters assigned to the client and also to update other configuration parameters. 


In case of No response from the DHCPv6 Server for the Renew message, the client sends a Rebind message to any available server to extend the lifetimes on the address and to update other configuration parameters. 


A Reply message is sent by the DHCPv6 Server in response to a Solicit, Request, Renew, Rebind message received from a client. The reply message is sent by the server in response to a confirm message (either confirming or denying) that the addresses assigned to the client are appropriate.In short the server acknowledge receipt of a Release or Decline message by sending a REPLY message. 


Release message as the name implies, is sent by the client to the server that has assigned the addresses, to indicate that the client will no longer use the assigned addresses (one or more). 


Client sends a Decline message to the DHCPv6 server to tell that the one or more addresses assigned by the server is already in use 


The Reconfigure Message is sent by the DHCPv6 server to the client when the server has new or updated information of configuration parameters. It tells the client to initiate a information-request/reply message to the server so as to receive the updated information. 


Information-Request message is sent by the client to the server to update the configuration parameters 

Reference: https://supportforums.cisco.com/blog/153426/implementing-dhcpv6-introduction 

Q510. Which two modes of operation does BFD support? (Choose two.) 

A. synchronous mode 

B. asynchronous mode 

C. demand mode 

D. echo mode 

E. aggressive mode 

F. passive mode 

Answer: B,C 


A session may operate in one of two modes: asynchronous mode and demand mode. In 

asynchronous mode, both endpoints periodically send Hello packets to each other. If a number of those packets are not received, the session is considered down. In demand mode, no Hello packets are exchanged after the session is established; it is assumed that the endpoints have another way to verify connectivity to each other, perhaps on the underlying physical layer. However, either host may still send Hello packets if needed. 

Reference: http://en.wikipedia.org/wiki/Bidirectional_Forwarding_Detection