Cisco Cisco test is probably the most demanding exams. Even so, it is the particular dream involving all ambitious IT task hunters. Passing the Cisco 400-101 genuine exam is never ever an effortless task. In case you are a busy worker, you might have no far more spare time to prepare for your 400-101 exam. Now Examcollection will help you get certified with all the quickest and latest Cisco 400-101 exam braindumps. We are usually sure youll successfully get the Cisco certification as long as an individual prepare the idea by utilizing the particular Examcollections Cisco practice question step simply by step. The Cisco 400-101 simulated questions and answers are usually compiled using high good quality and under the supervision involving our knowledgeable and qualified workers.

2021 Dec 400-101 ccie written passing score:

Q81. What is the most secure way to store ISAKMP/IPSec preshared keys in Cisco IOS? 

A. Use the service password-encryption command. 

B. Encrypt the ISAKMP preshared key in secure type 5 format. 

C. Encrypt the ISAKMP preshared key in secure type 7 format. 

D. Encrypt the ISAKMP preshared key in secure type 6 format. 



Using the Encrypted Preshared Key feature, you can securely store plain text passwords in type 6 format in NVRAM using a command-line interface (CLI). Type 6 passwords are encrypted. Although the encrypted passwords can be seen or retrieved, it is difficult to decrypt them to find out the actual password. This is currently the most secure way to store keys. 


Q82. Which two protocols are used to establish IPv6 connectivity over an MPLS network? (Choose two.) 

A. 6PE 

B. 6VPE 




F. IPv6IP 

Answer: A,B 

Q83. Which two statements about IS-IS wide metrics are true? (Choose two.) 

A. The wide metric is a 24-bit field. 

B. The maximum link metric is 16777215. 

C. R3 and R4 periodically advertise PNSP messages to synchronize the IS-IS database. 

D. IS-IS devices that are enabled with wide metrics can become neighbors with a device that uses standard metrics. 

E. The maximum link metric is 4261412864. 

F. The maximum path metric is 16777215. 

Answer: A,B 

Q84. Under which condition does UDP dominance occur? 

A. when TCP traffic is in the same class as UDP 

B. when UDP flows are assigned a lower priority queue 

C. when WRED is enabled 

D. when ACLs are in place to block TCP traffic 


Q85. Refer to the exhibit. 

Two multicast domains are configured as shown and connected with MSDP, but the two 

domains are unable to communicate. Which two actions can you take to correct the problem? (Choose two.) 

A. Change the peering IP address in AS 65220 to 

B. Change the peering AS on R2 to 65210. 

C. Verify that UDP port 639 is open. 

D. Verify that TCP port 139 is open. 

E. Change the MSDP originator-id to GigabitEthernet 0/0/0 on both routers. 

F. Change the MSDP peering IP address on R2 to 

Answer: A,B 

Abreast of the times 400-101 cisco ccie written:

Q86. Which circumstance can cause packet loss due to a microburst? 

A. slow convergence 

B. a blocked spanning-tree port 

C. process switching 

D. insufficient buffers 



Micro-bursting is a phenomenon where rapid bursts of data packets are sent in quick succession, leading to periods of full line-rate transmission that can overflow packet buffers of the network stack, both in network endpoints and routers and switches inside the network. 

Symptoms of micro bursts will manifest in the form of ignores and/ or overruns (also shown as accumulated in “input error” counter within show interface output). This is indicative of receive ring and corresponding packet buffer being overwhelmed due to data bursts coming in over extremely short period of time (microseconds). 


Q87. Refer to the exhibit. 

If the traffic flowing from network to is unencrypted, which two actions must you take to enable encryption? (Choose two). 

A. Configure the transform-set on R2 to match the configuration on R1. 

B. Configure the crypto map on R2 to include the correct subnet. 

C. Configure the ISAKMP policy names to match on R1 and R2. 

D. Configure the crypto map names to match on R1 and R2. 

E. Configure the Diffie-Hellman keys used in the ISAKMP policies to be different on R1 and R2. 

Answer: A,B 


A transform set combines an encryption method and an authentication method. During the IPsec security association negotiation with ISAKMP, the peers agree to use a particular transform set to protect a particular data flow. The transform set must be the same for both peers. Also, the crypto map on R2 points to the address name of VPN, which includes, but it should be the local subnet of 

Q88. Which statement is true about Fast Link Pulses in Ethernet? 

A. They are used during collision detection. 

B. They are used only if the media type is optical. 

C. They are part of UniDirectional Link Detection. 

D. They are used during autonegotiation. 



To make sure that your connection is operating properly, IEEE 802.3 Ethernet employs normal link pulses (NLPs), which are used for verifying link integrity in a 10BaseT system. This signaling gives you the link indication when you attach to the hub and is performed between two directly connected link interfaces (hub-to-station or station-to-station). NLPs are helpful in determining that a link has been established between devices, but they are not a good indicator that your cabling is free of problems. An extension of NLPs is fast link pulses. These do not perform link tests, but instead are employed in the autonegotiation process to advertise a device's capabilities. 



Drag and drop the MPLS term on the left to the function it performs on the right. 


Q90. Which Cisco IOS XE process administers routing and forwarding? 

A. Forwarding manager 

B. Interface manager 

C. Cisco IOS 

D. Host manager 



Some of the processes are listed in the table below: 



Affected FRUs 

SubPackage Mapping 

Host Manager 

Provides an interface between the IOS process and many of the information-gathering functions of the underlying platform kernel and operating system. 

RP (one instance per RP) 

SIP (one instance per SIP) 

ESP (one instance per ESP) 




Interface Manager 

Provides an interface between the IOS process and the per-SPA interface processes on the SIP. 

RP (one instance per RP) 

SIP (one instance per SIP) 




The IOS process implements all forwarding and routing features for the router. 

RP (one per software redundancy instance per RP). Maximum of two instances per RP. 


Forwarding Manager 

Manages the downloading of configuration to each of the ESPs and the communication of forwarding plane information, such as statistics, to the IOS process. 

RP (one per software redundancy instance per RP). Maximum of two instances per RP. 

ESP (one per ESP) 



Reference: /Software_Packaging_Architecture.html