Cisco 400-101 test is considered the most valuable associated with Pass4sure evaluation. Over the last few decades, laptop or computer scientific disciplines learning has made nearly all interest and the great globally. All of our 400-101 guides ensure you go your current recognition 400-101 test history your current first try, like a registered geologist network kitchen appliances. It is possible to get the certificates analysis, finding your way through your current 400-101 test groundwork guidebook which enables you to you without solely because of the good quality of your respective 400-101 test, yet that will encourage you the reason for 400-101 test.
2021 Mar 400-101 question
Q341. Which two routing protocols are not directly supported by Cisco PfR route control, and rely on the Cisco PfR subfeature PIRO? (Choose two.)
C. Static routing
Protocol Independent Route Optimization (PIRO) introduced the ability of Performance Routing (PfR) to search for a parent route—an exact matching route, or a less specific route—in the IP Routing Information Base (RIB), allowing PfR to be deployed in any IP-routed environment including Interior Gateway Protocols (IGPs) such as OSPF and IS-IS.
Q342. Which problem can result when private AS numbers are included in advertisements that are sent to the global Internet BGP table?
A. The prefixes sent with private AS numbers are always discarded on the Internet.
B. The prefixes sent with private AS numbers are always tagged as invalid on the Internet.
C. The prefixes sent with private AS numbers lack uniqueness, which can lead to a loss of connectivity.
D. The prefixes sent with private AS numbers are sometimes tagged as invalid on the Internet.
Private AS numbers are not meant to be used for global Internet BGP routing, as they are assigned locally and can be used by any organization. They are meant to enable BGP within a enterprise or VPN, but since these numbers can be used by any organization they are not unique and could cause connectivity loss if leaked to the Internet.
Q343. You are implementing new addressing with EIGRP routing and must use secondary addresses, which are missing from the routing table. Which action is the most efficient solution to the problem?
A. Disable split-horizon on the interfaces with secondary addresses.
B. Disable split-horizon inside the EIGRP process on the router with the secondary interface addresses.
C. Add additional router interfaces and move the secondary addresses to the new interfaces.
D. Use a different routing protocol and redistribute the routes between EIGRP and the new protocol.
Normally, routers that are connected to broadcast-type IP networks and that use distance-vector routing protocols employ the split horizon mechanism to reduce the possibility of routing loops. Split horizon blocks information about routes from being advertised by a router out of any interface from which that information originated. This behavior usually optimizes communications among multiple routers, particularly when links are broken. However, with nonbroadcast networks, situations can arise for which this behavior is less than ideal. For these situations, you might want to disable split horizon with EIGRP and RIP. If an interface is configured with secondary IP addresses and split horizon is enabled, updates might not be sourced by every secondary address. One routing update is sourced per network number unless split horizon is disabled.
Q344. Which feature of Cisco IOS XE Software allows for platform-independent code abstraction?
A. its security
B. Common Management Enabling Technology
C. the Linux-based environment
D. its modularity
Q345. Refer to the exhibit.
Which option is the result of this configuration?
A. Devices in OSPF area 15 can reach the summary route 192.168.0.0/16 and its more specific subnets.
B. Devices in OSPF area 15 can reach only the more specific routes of 192.168.0.0/16.
C. Devices in OSPF area 0 can reach the summary route 192.168.0.0/16 and its more specific subnets.
D. Devices in OSPF area 0 can reach only the summary route of 192.168.0.0/16.
. area range
To consolidate and summarize routes at an area boundary, use the area range command in router configuration mode. To disable this function, use theno form of this command. Area area-id range ip-address mask [advertise | not-advertise] [cost cost] no area area-id range ip-address mask [advertise | not-advertise] [cost cost]
. Syntax Description
Identifier of the area about which routes are to be summarized. It can be specified as either a decimal value or as an IP address.
IP address mask.
(Optional) Sets the address range status to advertise and generates a Type 3 summary link-state advertisement (LSA).
(Optional) Sets the address range status to DoNotAdvertise. The Type 3 summary LSA is suppressed, and the component networks remain hidden from other networks.
Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/iproute/command/reference/fiprrp_r/1rfospf. html
Updated 400-101 brain dumps:
Q346. Refer to the exhibit.
Which statement is true?
A. This is an MPLS TE point-to-multipoint LSP in an MPLS network.
B. This is an MPLS TE multipoint-to-point LSP in an MPLS network.
C. This is a point-to-multipoint LSP in an MPLS network.
D. This is a multipoint-to-multipoint LSP in an MPLS network.
Same example of this provided on slide 24 at the reference link below:
Reference: “mVPN Deployment Models” Cisco Live Presentation
http://d2zmdbbm9feqrf.cloudfront.net/2014/eur/pdf/BRKIPM-2011.pdf, slide 24
Q347. Refer to the exhibit.
Which feature can R1 use to fail over from R2 to R3 if the address for R2 becomes unavailable?
A. object tracking
The object tracking feature allows you to create a tracked object that multiple clients can use to modify the client behavior when a tracked object changes. Several clients register their interest with the tracking process, track the same object, and take different actions when the object state changes.
Clients include the following features:
. Embedded Event Manager (EEM)
. Gateway Load Balancing Protocol (GLBP)
. Hot Standby Redundancy Protocol (HSRP)
. Virtual port channel (vPC)
. Virtual Router Redundancy Protocol (VRRP)
The object tracking monitors the status of the tracked objects and communicates any changes made to interested clients. Each tracked object is identified by a unique number that clients can use to configure the action to take when a tracked object changes state.
Q348. Which three TLVs does LLDP use to discover network devices? (Choose three.)
A. Management address
B. Port description
C. Network policy
D. System name
E. Location information
F. Power management
Basic Management TLV Set
This set includes the following five TLVs used in LLDP:
. Port description TLV: Provides a description of the port in an alpha-numeric format. The value equals the ifDescr object, if the LAN device supports RFC 2863.
. System name TLV: Provides the system's assigned name in an alpha-numeric format. The value equals the sysName object, if the LAN device supports RFC 3418.
. System description TLV: Provides a description of the network entity in an alpha-numeric format. This includes system's name and versions of hardware, operating system and networking software supported in the device. The value equals the sysDescr object, if the LAN device supports RFC 3418.
. System capabilities TLV: Indicates the primary function(s) of the device and whether or not these functions are enabled in the device. The capabilities are indicated by two octects. Bits 0 through 7 indicate Other, Repeater, Bridge, WLAN AP, Router, Telephone, DOCSIS cable device and Station respectively. Bits 8 through 15 are reserved.
. Management address TLV: Indicates the addresses of the local LLDP agent. Other remote managers can use this address to obtain information related to the local device.
Q349. Refer to the exhibit.
What will be the extended community value of this route?
A. RT:200:3000 RT:200:9999
B. RT:200:9999 RT:200:3000
Here the route map is being used to manually set the extended community RT to 200:9999
Q350. Which ICMP message type is used to assist path MTU discovery?
A. destination unreachable
B. redirect message
C. source quench
D. time exceeded