Cisco 400-101 ExamCCIE Routing and Switching (v5.0)

Total Question: 427 Last Updated: Oct 11,2018
  • Updated 400-101 Dumps
  • Based on Real 400-101 Exams Scenarios
  • Free 400-101 pdf Demo Available
  • Check out our 400-101 Dumps in a new PDF format
  • Instant 400-101 download
  • Guarantee 400-101 success in first attempt
Package Select:

Questions & Answers PDF

Practice Test Software

Practice Test + PDF 30% Discount

Price: $65.95 $29.99

Buy Now Free Trial

Getting Smart with: gemini 400-101

It is impossible to pass Cisco 400-101 exam without any help in the short term. Come to Examcollection soon and find the most advanced, correct and guaranteed Cisco 400-101 practice questions. You will get a surprising result by our Abreast of the times CCIE Routing and Switching (v5.0) practice guides.

2016 Jun actual tests 400-101:

Q351. Refer to the exhibit. 

Which statement describes what the authoritative flag indicates? 

A. Authentication was used for the mapping. 

B. R1 learned about the NHRP mapping from a registration request. 

C. Duplicate mapping in the NHRP cache is prevented. 

D. The registration request had the same flag set. 

Answer: B 


Show NHRP: Examples 

The following is sample output from the show ip nhrp command: 

Router# show ip nhrp, tunnel 100 created 0:00:43 expire 1:59:16 

TypE. dynamic Flags: authoritative 

NBMA address: 10.1111.1111.1111.1111.1111.1111.1111.1111.1111.11, Tunnel0 created 0:10:03 expire 1:49:56 

TypE. static Flags: authoritative 

The fields in the sample display are as follows: 


authoritative—Indicates that the NHRP information was obtained from the Next Hop Server or router that maintains the NBMA-to-IP address mapping for a particular destination. 



Drag and drop Layer 2 QoS Commands on the left to the corresponding functions on the right. 


Q353. Refer to the exhibit. 

All switches have default bridge priorities, and originate BPDUs with MAC addresses as indicated. The numbers shown are STP link metrics. 

After STP converges, you discover that traffic from switch SWG toward switch SWD takes a less optimal path. What can you do to optimize the STP tree in this switched network? 

A. Change the priority of switch SWA to a lower value than the default value. 

B. Change the priority of switch SWB to a higher value than the default value. 

C. Change the priority of switch SWG to a higher value than the default value. 

D. Change the priority of switch SWD to a lower value than the default value. 

Answer: D 


In this topology, we see that all port paths and priorities are the same, so the lowest MAC address will be used to determine the best STP path. From SWG, SWE will be chosen as the next switch in the path because it has a lower MAC address than SWF. From SWE, traffic will go to SWC because it has a lower MAC address, and then to SWD, instead of going from SWE directly to SWD. If we lower the priority of SWD (lower means better with STP) then traffic will be sent directly to SWD. 

Q354. Refer to the exhibit. 

Which command can you enter to resolve this error message on a peer router? 

A. username <username> password <password> 

B. ppp chap <hostname> 

C. aaa authorization exec if-authenticated 

D. aaa authorization network if-authenticated 

Answer: A 

Q355. Which two options are benefits of EIGRP OTP? (Choose two.) 

A. It allows EIGRP routers to peer across a service provider without the service provider involvement. 

B. It allows the customer EIGRP domain to remain contiguous. 

C. It requires only minimal support from the service provider. 

D. It allows EIGRP neighbors to be discovered dynamically. 

E. It fully supports multicast traffic. 

F. It allows the administrator to use different autonomous system numbers per EIGRP domain. 

Answer: A,B 


EIGRP Over the Top (OTP) allows EIGRP routers to peer across a service provider infrastructure without the SP’s involvement. In fact with OTP, the provider won’t see customer routes at all. EIGRP OTP acts as a provider-independent overlay that transports customer data between the customer’s routers. To the customer, the EIGRP domain is contiguous. A customer’s EIGRP router sits at the edge of the provider cloud, and peers with another EIGRP router a different location across the cloud. Learned routes feature a next hop of the customer router — not the provider. Good news for service providers is that customers can deploy EIGRP OTP with their involvement 


400-101 download

Most up-to-date passed 400-101:

Q356. In which 802.1D port state are the root bridge, the root port, and the designated port(s) elected? 

A. Listening 

B. learning 

C. forwarding 

D. blocking 

E. disabled 

Answer: A 


STP switch port states: 

. Blocking – A port that would cause a switching loop if it were active. No user data is sent or received over a blocking port, but it may go into forwarding mode if the other links in use fail and the spanning tree algorithm determines the port may transition to the forwarding state. BPDU data is still received in blocking state. Prevents the use of looped paths. 

. Listening – The switch processes BPDUs and awaits possible new information that would cause it to return to the blocking state. It does not populate the MAC address table and it does not forward frames. In this state the root bridge, the root port, and the designated port(s) are elected. 

. Learning – While the port does not yet forward frames it does learn source addresses from frames received and adds them to the filtering database (switching database). It populates the MAC Address table, but does not forward frames. 

. Forwarding – A port receiving and sending data, normal operation. STP still monitors incoming BPDUs that would indicate it should return to the blocking state to prevent a loop. 

. Disabled – Not strictly part of STP, a network administrator can manually disable a port. 


Q357. Refer to the exhibit. 

What is a possible reason for the IPSec tunnel not establishing? 

A. The peer is unreachable. 

B. The transform sets do not match. 

C. The proxy IDs are invalid. 

D. The access lists do not match. 

Answer: D 


Proxy Identities Not Supported 

This message appears in debugs if the access list for IPsec traffic does not match. 

1d00h: IPSec(validate_transform_proposal): proxy identities not supported 

1d00h: ISAKMP: IPSec policy invalidated proposal 

1d00h: ISAKMP (0:2): SA not acceptable! 

The access lists on each peer needs to mirror each other (all entries need to be reversible). 

This example illustrates this point. 

Peer A 

access-list 150 permit ip 

access-list 150 permit ip host host 

Peer B 

access-list 150 permit ip 

access-list 150 permit ip host host 


Q358. What is the VLAN ID range of VLANs that are eligible for pruning? 

A. 2 through 1001 

B. 1 through 1005 

C. 1 through 4096 

D. 2 through 1005 

Answer: A 

Q359. Which three protocols support SSM? (Choose three.) 

A. IGMPv2 

B. IGMPv3 

C. IGMP v3lite 



F. IGMPv1 

Answer: B,C,D 

Q360. Which two conditions must be met by default to implement the BGP multipath feature? (Choose two.) 

A. The next-hop routers must be the same. 

B. Route reflectors must be enabled. 

C. All attributes must have the same values. 

D. MPLS must be enabled. 

E. The next-hop routers must be different. 

Answer: C,E 

Related 400-101 Articles

  • 100% Secure
  • Shopping Guide
  • 30 Days Money Back
  • No Plug-ins
  • 24 Hours Service