When you visit Ucertify.org, please stop at our residence page and also have a search carefully. You will discover all the important contents which may appear in the actual Cisco 400-101 exam. And if you dont know the way to prepare for that 400-101 exam, our specialists will help you, or even you can discover form the Cisco 400-101 study guide. Ucertify is the just one website that offers with every one of the Cisco Cisco preparation materials. If you are a busy worker, youd greater take component in our Cisco 400-101 education course. This is a quickest and audio way in your case to get your Cisco 400-101 certification.

2021 Dec ccie dumps 400-101:

Q411. Which two statements about Layer 2 Frame Prioritization bits are true? (Choose two.) 

A. 802.1Q frame headers carry the CoS value in the three most-significant bits of the 2-byte Tag Control Information field. 

B. ISL frame headers carry an IEEE 802.1P CoS value in the three least-significant bits of the 2-byte User field. 

C. ISL frame headers carry an IEEE 802.1P CoS value in the three most-significant bits of the 1-byte User field. 

D. On 802.1Q trunks, traffic in the native VLAN is carried in 802.1Q frames. 

E. Only 802.1Q and ISL frame types can carry CoS information. 

F. On 802.1Q trunks, traffic in the native VLAN is carried in 802.1P frames. 

Answer: A,E 


Q412. Which two statements about the command distance bgp 90 60 120 are true? (Choose two.) 

A. Implementing the command is a Cisco best practice. 

B. The external distance it sets is preferred over the internal distance. 

C. The internal distance it sets is preferred over the external distance. 

D. The local distance it sets may conflict with the EIGRP administrative distance. 

E. The internal distance it sets may conflict with the EIGRP administrative distance. 

F. The local distance it sets may conflict with the RIP administrative distance. 

Answer: C,F 

Explanation: 

To allow the use of external, internal, and local administrative distances that could be a better route than other external, internal, or local routes to a node, use the distance bgp command in address family or router configuration mode. To return to the default values, use the no form of this command. distance bgp external-distance internal-distance local-distance no distance bgp 

. Syntax Description 

external-distance 

Administrative distance for BGP external routes. External routes are routes for which the best path is learned from a neighbor external to the autonomous system. Accept table values are from 1 to 255. The default is 20. Routes with a distance of 255 are not installed in the routing table. 

internal-distance 

Administrative distance for BGP internal routes. Internal routes are those routes that are learned from another BGP entity within the same autonomous system. Accept table values are from 1 to 255. The default is 200. Routes with a distance of 255 are not installed in the routing table. 

local-distance 

Administrative distance for BGP local routes. Local routes are those networks listed with a network router configuration command, often as back doors, for that router or for networks that are being redistributed from another process. Accept table values are from 1 to 255. The default is 200. Routes with a distance of 255 are not installed in the routing table. 

Defaults 

external-distance: 20 

internal-distance: 200 

local-distance: 200 

In this case, the internal distance is 60 and the external is 90, and the local distance is 120 (same as RIP). 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/iproute/command/reference/fiprrp_r/1rfbgp1. html#wp1113874 


Q413. Which three benefits does the Cisco Easy Virtual Network provide to an enterprise network? 

(Choose three.) 

A. simplified Layer 3 network virtualization 

B. improved shared services support 

C. enhanced management, troubleshooting, and usability 

D. reduced configuration and deployment time for dot1q trunking 

E. increased network performance and throughput 

F. decreased BGP neighbor configurations 

Answer: A,B,C 


Q414. Which statement is true about MLD? 

A. MLD v1 gives hosts the ability to receive multicast packets from specific source addresses. 

B. All MLD messages are sent with a link-local IPv6 source address of FF02::D. 

C. The multicast address field is cleared to zero when sending an MLD report message. 

D. MLD is used by IPv6 routers to discover multicast listeners on a directly attached link. 

Answer:

Explanation: 

IPv6 Multicast Listener Discovery (MLD) is used by IPv6 devices to discover multicast listeners (nodes that want to receive multicast packets destined for specific multicast addresses) on directly attached links. There are two versions of MLD. MLD version 1 is based on version 2 of the IGMP for IPv4, and MLD version 2 is based on version 3 of the IGMP for IPv4. IPv6 multicast for Cisco software uses both MLD version 2 and MLD version 1. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipmulti_lsm/configuration/xe-3s/imc-lsm-xe-3s-book/ipv6-mcast-mld-xe.html 


Q415. Refer to the exhibit. 

Video Source S is sending interactive video traffic to Video Receiver R. Router R1 has multiple routing table entries for destination R. Which load-balancing mechanism on R1 can cause out-of-order video traffic to be received by destination R? 

A. per-flow load balancing on R1 for destination R 

B. per-source-destination pair load balancing on R1 for destination R 

C. CEF load balancing on R1 for destination R 

D. per-packet load balancing on R1 for destination R 

Answer:

Explanation: 

Per-packet load balancing guarantees equal load across all links, however potentially the packets may arrive out-of-order at the destination as differential delay may exist within the network. 

Reference: http://www.cisco.com/en/US/products/hw/modules/ps2033/prod_technical_reference09186 a00800afeb7.html 


Far out 400-101 ccie written passing score:

Q416. A service provider is deploying L2VPN LAN services in its MPLS cloud. Which statement is true regarding LDP signaling and autodiscovery? 

A. LDP signaling requires that each PE is identified, and that an LDP session is active with its P neighbor for autodiscovery to take place. 

B. LDP signaling requires that each P is identified, and that a targeted LDP session is active for autodiscovery to take place. 

C. LDP signaling requires that each PE is identified, and that a targeted LDP session with a BGP route reflector is active for autodiscovery to take place. 

D. LDP signaling requires that each PE is identified, and that a targeted LDP session is active for autodiscovery to take place. 

Answer:

Explanation: 

LDP signaling requires that each PE is identified and a targeted LDP session is active for autodiscovery to take place. Although the configuration can be automated using NMS/OSS the overall scalability of the solution is poor as a PE must be associated with all other PEs for LDP discovery to work, which can lead to a large number of targeted LDP sessions (n2), which may be largely unused as not all VPLS will be associated with every PE. The security attributes of LDP are reasonably good, although additional configuration is required to prevent unauthorized sessions being set up. Although LDP can signal additional attributes, it requires additional configuration either from an NMS/OSS or static configuration. 

Reference: http://www.cisco.com/en/US/products/hw/routers/ps368/products_white_paper09186a0080 1f6084.shtml 


Q417. Which two statements about PBR route maps are true? (Choose two.) 

A. They can use extended ACLs to identify traffic. 

B. They can route unicast traffic without interface-level classification. 

C. They can be applied to both ingress and egress traffic. 

D. They can classify traffic based on prefix-lists. 

E. They can set the metric and IP precedence bits. 

Answer: A,B 


Q418. Which statement about OSPF loop prevention is true? 

A. The discard route is generated automatically on the ABR to prevent routing loops. 

B. The ASBR uses type 3 LSAs from non-backbone areas to prevent control-plane routing loops. 

C. The ABR can filter type 3 LSPs to prevent routing loops. 

D. The DN bit ignores LSA types 2, 3, and 5 to prevent routing loops. 

Answer:


Q419. A network engineer is extending a LAN segment between two geographically separated data centers. Which enhancement to a spanning-tree design prevents unnecessary traffic from crossing the extended LAN segment? 

A. Modify the spanning-tree priorities to dictate the traffic flow. 

B. Create a Layer 3 transit VLAN to segment the traffic between the sites. 

C. Use VTP pruning on the trunk interfaces. 

D. Configure manual trunk pruning between the two locations. 

Answer:


Q420. Two routers are trying to establish an OSPFv3 adjacency over an Ethernet link, but the adjacency is not forming. Which two options are possible reasons that prevent OSPFv3 to form between these two routers? (Choose two.) 

A. mismatch of subnet masks 

B. mismatch of network types 

C. mismatch of authentication types 

D. mismatch of instance IDs 

E. mismatch of area types 

Answer: D,E 

Explanation: 

An OSPFv3 interface must have a compatible configuration with a remote interface before the two can be considered neighbors. The two OSPFv3 interfaces must match the following criteria: 

. Hello interval 

. Dead interval 

. Area ID 

. Optional capabilities 

The OSPFv3 header includes an instance ID field to identify that OSPFv3 packet for a particular OSPFv3 instance. You can assign the OSPFv3 instance. The interface drops all OSPFv3 packets that do not have a matching OSPFv3 instance ID in the packet header. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx-os/unicast/configuration/guide/l3_cli_nxos/l3_ospfv3.html