Proper study guides for Replace Cisco CCIE Routing and Switching (v5.0) certified begins with Cisco ccie 400 101 dumps preparation products which designed to deliver the Simulation passleader 400 101 questions by making you pass the cisco 400 101 test at your first time. Try the free 400 101 ccie demo right now.

Q1. Refer to the exhibit. 

Which statement about this GETVPN configuration is true? 

A. Co-operative key servers are configured. 

B. Redundant peers are configured. 

C. The key server uses multicast mode to propagate rekey messages. 

D. PSK authentication is configured. 

Answer:


Q2. Refer to the exhibit. 

Which log levels are enabled for the console? 

A. informational only 

B. informational and debugging 

C. informational, debugging, notifications, warnings, errors, critical, alerts, and emergencies 

D. informational, notifications, warnings, errors, critical, alerts, and emergencies 

Answer:


Q3. Which two BGP attributes are optional, non-transitive attributes? (Choose two.) 

A. AS path 

B. local preference 

C. MED 

D. weight 

E. cluster list 

Answer: C,E 


Q4. Refer to the exhibit. 

What kind of problem is detected? 

A. The packet types that are being sent are unknown. 

B. The maximum MTU size that can be used is 1492. 

C. Waiting for a reply timed out. 

D. Fragmentation starts to occur when the MTU of 1472 is reached. 

Answer:


Q5. Which technology can be used to secure the core of an STP domain? 

A. UplinkFast 

B. BPDU guard 

C. BPDU filter 

D. root guard 

Answer:

Explanation: 

Since STP does not implement any authentication or encryption to protect the exchange of BPDUs, it is vulnerable to unauthorized participation and attacks. Cisco IOS offers the STP Root Guard feature to enforce the placement of the root bridge and secure the core of the STP domain. 

STP root guard forces a port to become a designated port so that no switch on the other end of the link can become a root switch. If a port configured for root guard receives a superior BPDU, the port it is received on is blocked. In this way, STP root guard blocks other devices from trying to become the root bridge. 

STP root guard should be enabled on all ports that will never connect to a root bridge, for example, all end user ports. This ensures that a root bridge will never be negotiated on those ports. 

Reference: http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/Baseline_Security/secur ebasebook/sec_chap7.html 


Q6. A configuration includes the line ip route 10.0.0.0 255.0.0.0 172.16.10.10 permanent. 

Which option is a benefit of configuring this static route as permanent? 

A. It allows the route to be redistributed into the network even if the outgoing interface is down. 

B. It allows the route to be saved in the running configuration of the device. 

C. It places a hidden tag on the route that can be matched on other devices. 

D. It allows the route to have a tracking status even if no tracking object is configured. 

Answer:


Q7. Refer to the exhibit. 

Which statement describes the effect on the network if FastEthernet0/1 goes down temporarily? 

A. FastEthernet0/2 forwards traffic only until FastEthernet0/1 comes back up. 

B. FastEthernet0/2 stops forwarding traffic until FastEthernet0/1 comes back up. 

C. FastEthernet0/2 forwards traffic indefinitely. 

D. FastEthernet0/1 goes into standby. 

Answer:

Explanation: 

Use the switchport backup interface interface configuration command on a Layer 2 interface to configure Flex Links, a pair of interfaces that provide backup to each other. Use the no form of this command to remove the Flex Links configuration. With Flex Links configured, one link acts as the primary interface and forwards traffic, while the other interface is in standby mode, ready to begin forwarding traffic if the primary link shuts down. The interface being configured is referred to as the active link; the specified interface is identified as the backup link. The feature provides an alternative to the Spanning Tree Protocol (STP), allowing users to turn off STP and still retain basic link redundancy. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/command/reference/2960ComRef/cli3.html#wp3269214 


Q8. Refer to the exhibit. 

Which statement is true about a valid IPv6 address that can be configured on tunnel interface0? 

A. There is not enough information to calculate the IPv6 address. 

B. 6to4 tunneling allows you to use any IPv6 address. 

C. 2001:7DCB:5901::/128 is a valid IPv6 address. 

D. 2002:7DCB:5901::/128 is a valid IPv6 address. 

Answer:

Explanation: 

Most IPv6 networks use autoconfiguration, which requires the last 64 bits for the host. The first 64 bits are the IPv6 prefix. The first 16 bits of the prefix are always 2002:, the next 32 bits are the IPv4 address, and the last 16 bits of the prefix are available for addressing multiple IPv6 subnets behind the same 6to4 router. Since the IPv6 hosts using autoconfiguration already have determined the unique 64 bit host portion of their address, they must simply wait for a Router Advertisement indicating the first 64 bits of prefix to have a complete IPv6 address. A 6to4 router will know to send an encapsulated packet directly over IPv4 if the first 16 bits are 2002, using the next 32 as the destination, or otherwise send the packet to a well-known relay server, which has access to native IPv6. 

Reference: http://en.wikipedia.org/wiki/6to4 


Q9. Refer to the exhibit. 

Which technology can be used on the switch to enable host A to receive multicast packets for 239.2.2.2 but prevent host B from receiving them? 

A. IGMP filtering 

B. MLD snooping 

C. IGMP snooping 

D. MLD filtering 

Answer:

Explanation: 

IGMP snooping is the process of listening to Internet Group Management Protocol (IGMP) network traffic. The feature allows a network switch to listen in on the IGMP conversation between hosts and routers. By listening to these conversations the switch maintains a map of which links need which IP multicast streams. Multicasts may be filtered from the links which do not need them and thus controls which ports receive specific multicast traffic. 


Q10. Which two options are BGP attributes that are updated when router sends an update to its eBGP peer? (Choose two.) 

A. weight 

B. local preference 

C. AS_path 

D. next-hop 

Answer: C,D 

Explanation: 

AS_Path describes the inter-AS path taken to reach a destination. It gives a list of AS Numbers traversed when reaching to a destination. Every BGP speaker when advertising a route to a peer will include its own AS number in the NLRI. The subsequent BGP speakers who advertise this route will add their own AS number to the AS_Path, the subsequent AS numbers get prepended to the list. The end result is the AS_Path attribute is able to describe all the autonomous systems it has traversed, beginning with the most recent AS and ending with the originating AS. 

NEXT_HOP Attribute specifies the next hop IP address to reach the destination advertised in the NLRI. NEXT_HOP is a well-known mandatory attribute that is included in every eBGP update. 

Reference: http://netcerts.net/bgp-path-attributes-and-the-decision-process/