Cisco 400-101 ExamCCIE Routing and Switching (v5.0)

Total Question: 427 Last Updated: Oct 11,2018
  • Updated 400-101 Dumps
  • Based on Real 400-101 Exams Scenarios
  • Free 400-101 pdf Demo Available
  • Check out our 400-101 Dumps in a new PDF format
  • Instant 400-101 download
  • Guarantee 400-101 success in first attempt
Package Select:

Questions & Answers PDF

Practice Test Software

Practice Test + PDF 30% Discount

Price: $65.95 $29.99

Buy Now Free Trial

Super ways to ccie written exam

With the help of Ucertify 400-101 places, you can aquire a good end result merely that will make you complete Cisco check. In addition, if you been unsuccessful within the 400-101 test the first time of utilizing the products, just about all money you spend will be refund. You simply need to send out the 400-101 record records as the pdf to all of us. Following verifying your details, we are going to refund the money and also return it in your account as soon as possible.

2016 Jul 400-101 ccie dumps free download:

Q221. Refer to the exhibit. 


Which command is configured on this router? 

A. bgp update-delay 60 

B. neighbor 10.100.1.1 maximum-prefix 200 

C. neighbor 10.100.1.1 maximum-path 2 

D. neighbor 10.100.1.1 ebgp-multihop 2 

Answer: B 

Explanation: 

The BGP Maximum-Prefix feature allows you to control how many prefixes can be received from a neighbor. By default, this feature allows a router to bring down a peer when the number of received prefixes from that peer exceeds the configured Maximum-Prefix limit. This feature is commonly used for external BGP peers, but can be applied to internal BGP peers also. When the maximum number of prefixes has been received, the BGP sessions closes into the IDLE state. 

Reference: http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/25160-bgp-maximum-prefix.html 


Q222. DRAG DROP 

Drag and drop each STP port role on the left to the matching statement on the right. 


Answer: 



Q223. Refer to the exhibit. 


Which configuration must you apply to router R2 to enable BFD?

A) 

B) 

C) 

D) 

A. Exhibit A 

B. Exhibit B 

C. Exhibit C 

D. Exhibit D 

Answer: A 


Q224. Refer to the exhibit. The Main1 and Branch1 switches are connected directly over an MPLS pseudowire, and both run UDLD. After router B1 reloads because of a power failure, the pseudowire is restored. However, the Branch1 switch is unable to reach the Main1 switch. 


Which two actions can you take to restore connectivity and prevent the problem from recurring? (Choose two.) 

A. Configure a backup pseudowire between the Main1 and Branch1 switches. 

B. Enable UDLD recovery on both the Main1 and Branch1 switches. 

C. Configure a backup GRE tunnel between the Main1 and Branch1 switches. 

D. Enable errdisable recovery on both the Main1 and Branch1 switches. 

E. Issue the shutdown and no shutdown commands on both the Branch1 switch’s uplink to the B1 router and the Main1 switch’s uplink to the M1 router. 

F. Issue the shutdown and no shutdown commands on the Branch1 switch uplink to the B1 router only. 

Answer: D,F 


Q225. What is the most secure way to store ISAKMP/IPSec preshared keys in Cisco IOS? 

A. Use the service password-encryption command. 

B. Encrypt the ISAKMP preshared key in secure type 5 format. 

C. Encrypt the ISAKMP preshared key in secure type 7 format. 

D. Encrypt the ISAKMP preshared key in secure type 6 format. 

Answer: D 

Explanation: 

Using the Encrypted Preshared Key feature, you can securely store plain text passwords in type 6 format in NVRAM using a command-line interface (CLI). Type 6 passwords are encrypted. Although the encrypted passwords can be seen or retrieved, it is difficult to decrypt them to find out the actual password. This is currently the most secure way to store keys. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_ikevpn/configuration/xe-3s/asr1000/sec-ike-for-ipsec-vpns-xe-3s-asr1000-book/sec-encrypt-preshare.html 


400-101 free draindumps

Down to date ccie 400 101:

Q226. Which two descriptions of the keying mechanisms that are used to distribute the session keys used in routing authentication are true? (Choose two.) 

A. Peer keying creates a unique one-to-one relationship with another peer. 

B. Group keying creates a single keying message to multiple peers. 

C. Peer keying creates a single keying message to multiple peers. 

D. Group keying creates a unique one-to-one relationship with another peer. 

E. Group keying creates a full mesh of keying sessions to all devices. 

F. Peer keying creates a full mesh of keying sessions to all devices. 

Answer: A,B 


Q227. DRAG DROP 

Drag and drop the argument of the ip cef load-sharing algorithm command on the left to the function it performs on the right. 


Answer: 



Q228. Which three options are results of the command no mpls ip propagate-ttl? (Choose three.) 

A. It prevents the TTL from being copied from the IP header to the MPLS header. 

B. It prevents the MPLS hops from being visible to a CE router when you perform a traceroute. 

C. A fixed TTL value of 255 is used for the first label of the IP packet. 

D. It prevents the TTL from being copied from the MPLS header back into the IP header. 

E. MPLS hops remain visible on a CE router when you perform a traceroute. 

F. A fixed TTL value of 1 is used for the first label of the IP packet. 

Answer: A,B,C 


Q229. You are configuring Wireshark on a Cisco Catalyst 4500E Switch with a Supervisor 8. Which three actions can you take to prevent the capture from overloading the CPU? (Choose three.) 

A. Attach the specific ports that are part of the data path. 

B. Use an in-line filter. 

C. Use an appropriate ACL. 

D. Add memory to the Supervisor. 

E. Reconfigure the buffers to accommodate the additional traffic. 

F. Configure a policy map, class map, and an access list to express the match conditions. 

Answer: A,B,C 

Explanation: 

Because packet forwarding typically occurs in hardware, packets are not copied to the CPU for software processing. For Wireshark packet capture, packets are copied and delivered to the CPU, which causes an increase in CPU usage. To avoid high CPU, do the following: 

. Attach only relevant ports. 

. Use a class map, and secondarily, an access list to express match conditions. If neither is viable, use an explicit, in-line filter. 

. Adhere closely to the filter rules. Restrict the traffic type (such as, IPv4 only) with a restrictive, rather than relaxed ACL, which elicits unwanted traffic. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/15-1-2/XE_340/configuration/guide/config/wireshrk.pdf 


Q230. Which two options are the two main phases of PPPoE? (Choose two.) 

A. Active Discovery Phase 

B. IKE Phase 

C. Main Mode Phase 

D. PPP Session Phase 

E. Aggressive Mode Phase 

F. Negotiation Phase 

Answer: A,D 

Explanation: 

PPPoE is composed of two main phases: 

Active Discovery Phase — In this phase, the PPPoE client locates a PPPoE server, called an access concentrator. During this phase, a Session ID is assigned and the PPPoE layer is established. 

PPP Session Phase — In this phase, PPP options are negotiated and authentication is performed. Once the link setup is completed, PPPoE functions as a Layer 2 encapsulation method, allowing data to be transferred over the PPP link within PPPoE headers. 

Reference: http://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/vpn/asa-vpn-cli/vpn-pppoe.html 


Related 400-101 Articles