Cisco 400-101 ExamCCIE Routing and Switching (v5.0)

Total Question: 446 Last Updated: Aug 19,2019
  • Updated 400-101 Dumps
  • Based on Real 400-101 Exams Scenarios
  • Free 400-101 pdf Demo Available
  • Check out our 400-101 Dumps in a new PDF format
  • Instant 400-101 download
  • Guarantee 400-101 success in first attempt
Package Select:

Questions & Answers PDF

Practice Test Software

Practice Test + PDF 30% Discount

Price: $65.95 $39.99

Buy Now Free Trial

Tips for yahoo video error 400-101

Were the best in adding the most helpful 400-101 equipment for our consumers that will undoubtedly make these people flourish in the real Cisco 400-101 examination. An ideal Cisco guidebook features a splendid as well as basic substance that prepares a person totally and gives the guarantee of the success that isnt a little thing. Just download the actual Examcollection 400-101 CCIE Routing and Switching (v5.0) free of charge trial functions to see the options and degree of Examcollection goods. You will end up motivated from your 400-101 examine guidebook pdf defiantly. Should you deed any 100% success, utilizing Examcollection 400-101 for the CCIE Routing and Switching (v5.0) qualified planning is the better option.

2016 Jun ccie 400-101 forum:

Q301. Which statement about passive interfaces is true? 

A. The interface with the OSPF passive interface configuration appears as a not-so-stubby network. 

B. The interface with the EIGRP passive interface configuration ignores routes after the exchange of hello packets. 

C. The interface with the IS-IS passive interface configuration sends the IP address of that interface in the link-state protocol data units. 

D. Passive interface can be configured on the interface for IS-IS. 

Answer: C 


With IS-IS, passive interfaces are used to prevent unnecessary LSA packets out that interface, but the IP address of passive interfaces are still included in updates going out the other interfaces. This behavior is what enables the best practice of configuring loopback interfaces as passive, but still having the loopback be reachable. 

Q302. Which option is the default point of insertion for the BGP cost community? 

A. before best path calculation 

B. after best path calculation 

C. after the IGP metric comparison 

D. after the router ID comparison 

Answer: C 

Q303. Which three improvements does Cisco IOS XE Software offer over traditional IOS Software? (Choose three.) 

A. It can run applications as separate processes on multicore CPUs. 

B. It supports drivers for data plane ASICs outside of the operating system. 

C. It allows platform-dependent code to be compiled into a single image. 

D. It supports multiple IOS instances simultaneously, sharing resources and internal infrastructure for scalability. 

E. It allows platform-independent code to be abstracted into a single microkernel for portability across platforms. 

F. It uses a QNX Neutrino-based environment underneath the IOS Software. 

Answer: A,B,C 

Q304. In which two situations is an EIGRP hello packet sent as unicast? (Choose two.) 

A. during neighbor discovery 

B. when link costs change 

C. when the neighbor command is used 

D. when an ACK is sent 

Answer: C,D 

Q305. Refer to the exhibit. 

For which reason could a BGP-speaking device in autonomous system 65534 be prevented from installing the given route in its BGP table? 

A. The AS number of the BGP is specified in the given AS_PATH. 

B. The origin of the given route is unknown. 

C. BGP is designed only for publicly routed addresses. 

D. The AS_PATH for the specified prefix exceeds the maximum number of ASs allowed. 

E. BGP does not allow the AS number 65535. 

Answer: A 


BGP is considered to be a 'Path Vector' routing protocol rather than a distance vector routing protocol since it utilises a list of AS numbers to describe the path that a packet should take. This list is called the AS_PATH. Loops are prevented because if a BGP speaking router sees it's own AS in the AS_PATH of a route it rejects the route. 

400-101 actual exam

Improve avenida armando lombardi 400. lojas 101-105:

Q306. Refer to the exhibit. 

Why is network not installed in the routing table? 

A. There is no ARP entry for 

B. The router cannot ping 

C. The neighbor just timed out and BGP will flush this prefix the next time that the BGP scanner runs. 

D. There is no route for in the routing table. 

Answer: D 


Here we see that the next hop IP address to reach the network advertised by the BGP peer is However, the IP is not in the routing table of R3 so it adds the route to the BGP table but marks it as inaccessible, as shown. 


Drag and drop the Metro Ethernet circuit on the left to the corresponding Service Type category on the right. 



Drag and drop the OTV component on the left to the function it performs on the right. 


Q309. Which statement about OSPF loop prevention is true? 

A. The discard route is generated automatically on the ABR to prevent routing loops. 

B. The ASBR uses type 3 LSAs from non-backbone areas to prevent control-plane routing loops. 

C. The ABR can filter type 3 LSPs to prevent routing loops. 

D. The DN bit ignores LSA types 2, 3, and 5 to prevent routing loops. 

Answer: A 

Q310. Which two statements about the ipv6 ospf authentication command are true? (Choose two.) 

A. The command is required if you implement the IPsec AH header. 

B. The command configures an SPI. 

C. The command is required if you implement the IPsec TLV. 

D. The command can be used in conjunction with the SPI authentication algorithm. 

E. The command must be configured under the OSPFv3 process. 

Answer: A,B 


OSPFv3 requires the use of IPsec to enable authentication. Crypto images are required to use authentication, because only crypto images include the IPsec API needed for use with OSPFv3. In OSPFv3, authentication fields have been removed from OSPFv3 packet headers. When OSPFv3 runs on IPv6, OSPFv3 requires the IPv6 authentication header (AH) or IPv6 ESP header to ensure integrity, authentication, and confidentiality of routing exchanges. IPv6 AH and ESP extension headers can be used to provide authentication and confidentiality to OSPFv3. To use the IPsec AH, you must enable the ipv6 ospf authentication command. To use the IPsec ESP header, you must enable the ipv6 ospf encryption command. The ESP header may be applied alone or in combination with the AH, and when ESP is used, both encryption and authentication are provided. Security services can be provided between a pair of communicating hosts, between a pair of communicating security gateways, or between a security gateway and a host. To configure IPsec, you configure a security policy, which is a combination of the security policy index (SPI) and the key (the key is used to create and validate the hash value). IPsec for OSPFv3 can be configured on an interface or on an OSPFv3 area. For higher security, you should configure a different policy on each interface configured with IPsec. If you configure IPsec for an OSPFv3 area, the policy is applied to all of the interfaces in that area, except for the interfaces that have IPsec configured directly. Once IPsec is configured for OSPFv3, IPsec is invisible to you. 


Related 400-101 Articles