By way of as a possible Cisco Authorized one demonstrates one understands huge choice associated with ability required by Cisco experts within the chosen occupation role. A Cisco 400-101 is within popular in this current market. A 400-101 Cisco increases a persons field of vision together with improves access to the actual sectors roughest possibilities. Your sales of experts within the i . t . (Them) sector is huge, along with the levels of competition intended for tasks is certainly rigorous.

2021 Mar 400-101 testing engine

Q401. Refer to the exhibit. 

Which two statements about this egress queue are true? (Choose two.) 

A. The queue 3 buffer is allocated 20 percent, its drop threshold is 100 percent, and it is guaranteed 400 percent of memory. 

B. The queue 1 buffer is allocated 30 percent, its drop threshold is 25 percent, and it is guaranteed 100 percent of memory. 

C. The queue 1 buffer is allocated 30 percent, its drop threshold is 100 percent, and it is guaranteed 150 percent of memory. 

D. The queue 2 buffer is allocated 30 percent, its drop threshold is 200 percent, and it can use at maximum 400 percent of memory. 

E. The queue 3 buffer is allocated 30 percent, its drop threshold is 100 percent, and it can use at maximum 400 percent of memory. 

Answer: B,D 


Q402. Refer to the exhibit. 

The VLAN-to-MST mapping is shown. (Assume SW1 acts as root for all possible MST instances.) 

spanning-tree mst configuration name MST 

revision 2 

instance 0 vlan 1-200,301-4094 instance 1 vlan 201-300 

If this topology is deployed, which action is required for traffic to flow on VLAN 200 and 300? 

A. Map VLAN 300 to instance 0. 

B. Map VLAN 200 to instance 2. 

C. Move instance 0 root to SW2. 

D. Move instance 1 root to SW2. 

E. Map both VLANs to instance 2. 

Answer:


Q403. In an STP domain, which two statements are true for a nonroot switch, when it receives a configuration BPDU from the root bridge with the TC bit set? (Choose two.) 

A. It sets the MAC table aging time to max_age time. 

B. It sets the MAC table aging time to forward_delay time. 

C. It recalculates the STP topology upon receiving topology change notification from the root switch. 

D. It does not recalculate the STP topology upon receiving topology change notification from the root switch. 

Answer: B,D 


Q404. DRAG DROP 

Drag and Drop Cisco PFR adjacency types. 

Answer: 


Q405. Which Cisco IOS XE process administers routing and forwarding? 

A. Forwarding manager 

B. Interface manager 

C. Cisco IOS 

D. Host manager 

Answer:

Explanation: 

Some of the processes are listed in the table below: 

Process 

Purpose 

Affected FRUs 

SubPackage Mapping 

Host Manager 

Provides an interface between the IOS process and many of the information-gathering functions of the underlying platform kernel and operating system. 

RP (one instance per RP) 

SIP (one instance per SIP) 

ESP (one instance per ESP) 

RPControl 

SIPBase 

ESPBase 

Interface Manager 

Provides an interface between the IOS process and the per-SPA interface processes on the SIP. 

RP (one instance per RP) 

SIP (one instance per SIP) 

RPControl 

SIPBase 

IOS 

The IOS process implements all forwarding and routing features for the router. 

RP (one per software redundancy instance per RP). Maximum of two instances per RP. 

RPIOS 

Forwarding Manager 

Manages the downloading of configuration to each of the ESPs and the communication of forwarding plane information, such as statistics, to the IOS process. 

RP (one per software redundancy instance per RP). Maximum of two instances per RP. 

ESP (one per ESP) 

RPControl 

ESPBase 

Reference: http://www.cisco.com/c/en/us/td/docs/routers/asr1000/configuration/guide/chassis/asrswcfg /Software_Packaging_Architecture.html 


Abreast of the times 400-101 latest exam:

Q406. Which statement about the overload bit in IS-IS is true? 

A. The IS-IS adjacencies on the links for which the overload bit is set are brought down. 

B. Routers running SPF ignore LSPs with the overload bit set and hence avoid blackholing traffic. 

C. A router setting the overload bit becomes unreachable to all other routers in the IS-IS area. 

D. The overload bit in IS-IS is used only for external prefixes. 

Answer:

Explanation: 

The OL bit is used to prevent unintentional blackholing of packets in BGP transit networks. Due to the nature of these protocols, IS-IS and OSPF converge must faster than BGP. Thus there is a possibility that while the IGP has converged, IBGP is still learning the routes. In that case if other IBGP routers start sending traffic towards this IBGP router that has not yet completely converged it will start dropping traffic. This is because it isnt yet aware of the complete BGP routes. OL bit comes handy in such situations. When a new IBGP neighbor is added or a router restarts, the IS-IS OL bit is set. Since directly connected (including loopbacks) addresses on an “overloaded” router are considered by other routers, IBGP can be bought up and can begin exchanging routes. Other routers will not use this router for transit traffic and will route the packets out through an alternate path. Once BGP has converged, the OL bit is cleared and this router can begin forwarding transit traffic. 

Reference: https://routingfreak.wordpress.com/category/ospf-vs-is-is/ 


Q407. Which three factors does Cisco PfR use to calculate the best exit path? (Choose three.) 

A. quality of service 

B. packet size 

C. delay 

D. loss 

E. reachability 

F. administrative distance 

Answer: C,D,E 

Explanation: 

Cisco PfR selects an egress or ingress WAN path based on parameters that affect application performance, including reachability, delay, cost, jitter, and Mean Opinion Score (MOS). 

Reference: http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/performance-routing-pfr/product_data_sheet0900aecd806c4ee4.html 


Q408. Which statement about the BGP scope of the cost community is true? 

A. It is shared with IBGP neighbors only. 

B. It is shared with IBGP neighbors and route reflectors. 

C. It is shared with EBGP neighbors only. 

D. It is shared with IBGP and EBGP neighbors. 

E. It is shared with IBGP and confederation peers. 

Answer:

Explanation: 

The BGP Cost Community feature introduces the cost extended community attribute. The cost community is a non-transitive extended community attribute that is passed to internal BGP (iBGP) and confederation peers but not to external BGP (eBGP) peers. The cost community feature allows you to customize the local route preference and influence the best path selection process by assigning cost values to specific routes. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/s_bgpcc.html 


Q409. Which two protocols are not protected in an edge router by using control plane policing? (Choose two.) 

A. SMTP 

B. RPC 

C. SSH 

D. Telnet 

Answer: A,B 

Explanation: 

A CoPP policy can limit a number of different packet types that are forwarded to the control plane. Traffic destined for the switch CPU includes: 

. Address Resolution Protocol (ARP) 

. First-hop redundancy protocol packets 

. Layer 2 control packets 

. Management packets (telnet, Secure Shell [SSH] Protocol, Simple Network Management Protocol [SNMP]) <--- C and D are not correct. 

. Multicast control packets 

. Routing protocol packets 

. Packets with IP options 

. Packets with time to live (TTL) set to 1 

. Packets that require ACL logging 

. Packets that require an initial lookup (first packet in a flow: FIB miss) 

. Packets that have don't support hardware switching/routing 

Reference: http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-series-switches/white_paper_c11_553261.html 


Q410. Refer to the exhibit. 

Why is the router not accessible via Telnet on the GigabitEthernet0 management interface? 

A. The wrong port is being used in the telnet-acl access list. 

B. The subnet mask is incorrect in the telnet-acl access list. 

C. The log keyword needs to be removed from the telnet-acl access list. 

D. The access class needs to have the vrf-also keyword added. 

Answer:

Explanation: 

The correct command should be “access-class telnet-acl in vrf-also”. If you do not specify the vrf-also keyword, incoming Telnet connections from interfaces that are part of a VRF are rejected.