Cisco 400-101 ExamCCIE Routing and Switching (v5.0)

Total Question: 427 Last Updated: Oct 11,2018
  • Updated 400-101 Dumps
  • Based on Real 400-101 Exams Scenarios
  • Free 400-101 pdf Demo Available
  • Check out our 400-101 Dumps in a new PDF format
  • Instant 400-101 download
  • Guarantee 400-101 success in first attempt
Package Select:

Questions & Answers PDF

Practice Test Software

Practice Test + PDF 30% Discount

Price: $65.95 $29.99

Buy Now Free Trial

Jun 2016 updated: passed 400-101

Exam Code: 400-101 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CCIE Routing and Switching (v5.0)
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass 400-101 Exam.

2016 Jun 400-101 Study Guide Questions:

Q341. Which three options are components of an EEM CLI policy? (Choose three.) 

A. Safe-Tcl 

B. applet name 

C. Fast Tcl 

D. event 

E. action 

F. Tcl bytecode 

Answer: B,D,E 

Explanation: 

The Embedded Event Manager (EEM) monitors events that occur on your device and takes action to recover or troubleshoot these events, based on your configuration. 

EEM consists of three major components: 

Event statements — Events to monitor from another Cisco NX-OS component that might require some action, workaround, or notification. 

Action statements — An action that EEM can take, such as sending an e-mail, or disabling an interface, to recover from an event. 

Policies — An applet name paired with one or more actions to troubleshoot or recover from the event. 

Reference: 

http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5500/sw/system_manage ment/6x/b_5500_System_Mgmt_Config_6x/b_5500_System_Mgmt_Config_6x_chapter_01 0011.html 


Q342. Which three options are characteristics of a Type 10 LSA? (Choose three.) 

A. It is an area-local, opaque LSA. 

B. Data is flooded to all routers in the LSA scope. 

C. It is used for traffic-engineering extensions to OSPF. 

D. It is a link-local, opaque LSA. 

E. Data is flooded only to the routers in the LSA scope that understand the data. 

F. It is used for traffic-engineering extensions to LDP. 

Answer: A,B,C 


Q343. Refer to the exhibit. 


Which option is the result of this configuration? 

A. Devices in OSPF area 15 can reach the summary route 192.168.0.0/16 and its more specific subnets. 

B. Devices in OSPF area 15 can reach only the more specific routes of 192.168.0.0/16. 

C. Devices in OSPF area 0 can reach the summary route 192.168.0.0/16 and its more specific subnets. 

D. Devices in OSPF area 0 can reach only the summary route of 192.168.0.0/16. 

Answer: A 

Explanation: 

. area range 

To consolidate and summarize routes at an area boundary, use the area range command in router configuration mode. To disable this function, use theno form of this command. Area area-id range ip-address mask [advertise | not-advertise] [cost cost] no area area-id range ip-address mask [advertise | not-advertise] [cost cost] 

. Syntax Description 

area-id 

Identifier of the area about which routes are to be summarized. It can be specified as either a decimal value or as an IP address. 

ip-address 

IP address. 

mask 

IP address mask. 

advertise 

(Optional) Sets the address range status to advertise and generates a Type 3 summary link-state advertisement (LSA). 

not-advertise 

(Optional) Sets the address range status to DoNotAdvertise. The Type 3 summary LSA is suppressed, and the component networks remain hidden from other networks. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/iproute/command/reference/fiprrp_r/1rfospf. html 


400-101 exam answers

Leading ccie 400-101 exam cost:

Q344. Which two statements about MAC Authentication Bypass are true? (Choose two.) 

A. Traffic from an endpoint is authorized to pass after MAB authenticates the MAC address of the endpoint. 

B. During the learning stage, the switch examines multiple packets from the endpoint to determine the MAC address of the endpoint. 

C. After the switch learns the MAC address of the endpoint, it uses TACACS+ to authenticate it. 

D. After learning a source MAC address, it sends the host a RADIUS Account-Request message to validate the address. 

E. The MAC address of a device serves as its user name and password to authenticate with a RADIUS server. 

Answer: A,E 


Q345. Which three options are sub-subfields of the IPv4 Option Type subfield? (Choose three.) 

A. Option Class 

B. GET 

C. Copied 

D. PUSH 

E. Option Number 

F. TTL 

Answer: A,C,E 

Explanation: 

Each IP option has its own subfield format, generally structured as shown below. For most options, all three subfields are used. Option Type, Option Length and Option Data. 


Reference: http://www.tcpipguide.com/free/t_IPDatagramOptionsandOptionFormat.htm 


Q346. Refer to the exhibit. 


When the link between RtrB and RtrC goes down, multicast receivers stop receiving traffic from the source for multicast group 229.1.1.1.Which solution will resolve this? 

A. adding a static mroute on RtrB and RtrF 

B. adding a static unicast route on RtrB and RtrF 

C. creating a GRE tunnel between RtrB and RtrD 

D. enabling PIM sparse mode on both ends of the link between RtrB and RtrF 

Answer: D 

Explanation: 

For multicast traffic to flow, PIM must be enabled on all routers in the path of the multicast stream. 


400-101 vce

Certified 400-101 ccie routing and switching:

Q347. Which two BGP attributes are optional, non-transitive attributes? (Choose two.) 

A. AS path 

B. local preference 

C. MED 

D. weight 

E. cluster list 

Answer: C,E 


Q348. Which two statements about BPDU guard are true? (Choose two.) 

A. The global configuration command spanning-tree portfast bpduguard default shuts down interfaces that are in the PortFast-operational state when a BPDU is received on that port. 

B. The interface configuration command spanning-tree portfast bpduguard enable shuts down only interfaces with PortFast enabled when a BPDU is received. 

C. BPDU guard can be used to prevent an access port from participating in the spanning tree in the service provider environment. 

D. BPDU guard can be used to protect the root port. 

E. BPDU guard can be used to prevent an invalid BPDU from propagating throughout the network. 

Answer: A,C 


Q349. DRAG DROP 


Answer: 



Q350. Which two options are EEM policies? (Choose two.) 

A. applets 

B. event detectors 

C. scripts 

D. syslogs 

E. actions 

Answer: A,C 


Related 400-101 Articles