Cisco 400-101 ExamCCIE Routing and Switching (v5.0)

Total Question: 427 Last Updated: Oct 11,2018
  • Updated 400-101 Dumps
  • Based on Real 400-101 Exams Scenarios
  • Free 400-101 pdf Demo Available
  • Check out our 400-101 Dumps in a new PDF format
  • Instant 400-101 download
  • Guarantee 400-101 success in first attempt
Package Select:

Questions & Answers PDF

Practice Test Software

Practice Test + PDF 30% Discount

Price: $65.95 $29.99

Buy Now Free Trial

Secrets to ccie 400 101 dumps

Pass4sure offers free demo for 400 101 ccie exam. "CCIE Routing and Switching (v5.0)", also known as exam 400 101 exam, is a Cisco Certification. This set of posts, Passing the Cisco 400 101 vce exam, will help you answer those questions. The cisco 400 101 Questions & Answers covers all the knowledge points of the real exam. 100% real Cisco cisco 400 101 exams and revised by experts!

Q381. You are backing up a server with a 1 Gbps link and a latency of 2 ms. Which two statements about the backup are true? (Choose two.) 

A. The bandwidth delay product is 2 Mb. 

B. The default TCP send window size is the limiting factor. 

C. The default TCP receive window size is the limiting factor. 

D. The bandwidth delay product is 500 Mb. 

E. The bandwidth delay product is 50 Mb. 

Answer: A,C 

Explanation: 

1 Gbps is the same as 1000 Mbps, and 1000Mb x .0002 = 2 Mbps. With TCP based data transfers, the receive window is always the limiting factor, as the sender is generally able to send traffic at line rate, but then must wait for the acknowledgements to send more data. 


Q382. Refer to the exhibit. 

Which statement about this COS-DSCP mapping is true? 

A. The expedited forwarding DSCP is mapped to COS 3. 

B. COS 16 is mapped to DSCP 2. 

C. The default COS is mapped to DSCP 32. 

D. This mapping is the default COS-DSCP mapping on Cisco switches. 

Answer:

Explanation: 

Here we see that COS 3 is mapped to DSCP 46, which is the Expedited forwarding class: The Expedited Forwarding (EF) model is used to provide resources to latency (delay) sensitive real-time, interactive traffic. The EF model uses one marking -- DSCP 46. 


Q383. A network engineer wants to add a new switch to an existing switch stack. Which configuration must be added to the new switch before it can be added to the switch stack? 

A. No configuration must be added. 

B. stack ID 

C. IP address 

D. VLAN information 

E. VTP information 

Answer:


Q384. What is the preferred method to improve neighbor loss detection in EIGRP? 

A. EIGRP natively detects neighbor down immediately, and no additional feature or configuration is required. 

B. BFD should be used on interfaces that support it for rapid neighbor loss detection. 

C. Fast hellos (subsecond) are preferred for EIGRP, so that it learns rapidly through its own mechanisms. 

D. Fast hellos (one-second hellos) are preferred for EIGRP, so that it learns rapidly through its own mechanisms. 

Answer:

Explanation: 

Bi-directional Forwarding Detection (BFD) provides rapid failure detection times between forwarding engines, while maintaining low overhead. It also provides a single, standardized method of link/device/protocol failure detection at any protocol layer and over any media. 

Reference: “Bidirectional Forwarding Detection for EIGRP” 

http://www.cisco.com/en/US/technologies/tk648/tk365/tk207/technologies_white_paper090 0aecd80243fe7.html 


Q385. Refer to the exhibit. 

Which two statements about this capture are true? (Choose two.) 

A. It is set to run for five minutes. 

B. It continues to capture data after the buffer is full. 

C. It is set to run for a period of 00:03:26. 

D. It captures data only until the buffer is full. 

E. It is set to use the default buffer type. 

Answer: A,B 


Q386. Which two OSPF LSA types are flooded within the originating area? (Choose two.) 

A. type 1, Router LSA 

B. type 2, Network LSA 

C. type 3, Network Summary LSA 

D. type 4, ASBR Summary LSA 

E. type 6, Group Membership LSA 

F. type 9, Opaque LSA 

Answer: A,B 

Explanation: 

OSPF relies on several types of Link State Advertisements (LSAs) to communicate link state information between neighbors. A brief review of the most applicable LSA types: 

. Type 1 - Represents a router 

. Type 2 - Represents the pseudonode (designated router) for a multiaccess link 

. Type 3 - A network link summary (internal route) 

. Type 4 - Represents an ASBR 

. Type 5 - A route external to the OSPF domain 

. Type 7 - Used in stub areas in place of a type 5 LSA LSA types 1 and 2 are found in all areas, and are never flooded outside of an area. They are only flooded within the area that they originated from. 

Reference: http://packetlife.net/blog/2008/jun/24/ospf-area-types/ 


Q387. Which three routing protocols utilize TLVs? (Choose three.) 

A. BGP 

B. IS-IS 

C. ODR 

D. OSPF 

E. EIGRP 

F. RIP 

Answer: A,B,E 

Explanation: 

IS-IS, originally designed for Open System Interconnection (OSI) routing, uses TLV parameters to carry information in Link State Packets (LSPs). The TLVs make IS-IS extendable. IS-IS can therefore carry different kinds of information in the LSPs. Several routing protocols use TLVs to carry a variety of attributes. Cisco Discovery Protocol (CDP), Label Discovery Protocol (LDP), and Border Gateway Protocol (BGP) are examples of protocols that use TLVs. BGP uses TLVs to carry attributes such as Network Layer Reachability Information (NLRI), Multiple Exit Discriminator (MED), and local pReference: The IP header of the EIGRP packet specifies IP protocol number 88 within it, and the maximum length of the packet will be the IP MTU of the interface on which it is transmitted, most of the time 1500 octets. Following the IP header is the various Type/Length/Value (TLV) triplets. These TLVs will not only carry the route entries but also provide fields for the management of the DUAL process, multicast sequencing, and IOS software versions from the router. 

References: http://www.cisco.com/c/en/us/support/docs/ip/integrated-intermediate-system-to-intermediate-system-is-is/5739-tlvs-5739.html http://ericleahy.com/index.php/eigrp-packets-neighborships/ 


Q388. Which two values are needed to configure NTP authentication? (Choose two.) 

A. the encryption method 

B. the key number 

C. the burst mode 

D. the key string 

E. the Diffie-Hellman group 

Answer: B,D 


Q389. Refer to the exhibit. 

What will be the extended community value of this route? 

A. RT:200:3000 RT:200:9999 

B. RT:200:9999 RT:200:3000 

C. RT:200:3000 

D. RT:200:9999 

Answer:

Explanation: 

Here the route map is being used to manually set the extended community RT to 200:9999 


Q390. Refer to the exhibit. 

Which two actions can you take to enable CE-1 at site A to access the Internet? (Choose two.) 

A. Create a default route for site A on PE-1 with the next hop set to the PE-2 interface to the Internet. 

B. Originate a default route in site B with the next hop set to the PE-2 Internet interface, and import the default route into site A. 

C. Create a default route on CE-1 with the next hop set to the PE-1 upstream interface. 

D. Originate a default route in site A with the next hop set to the PE-2 interface to CE-1. 

E. Create a static default route on CE-1 with the next hop set to the PE-2 interface to the Internet. 

Answer: A,B 


Related 400-101 Articles