
We provide real 400 101 pdf exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Cisco 400 101 vce Exam quickly & easily. The ccie 400 101 PDF type is available for reading and printing. You can print more and practice many times. With the help of our Cisco passleader 400 101 dumps pdf and vce product and material, you can easily pass the 400 101 dumps exam.
Q141. Which statement about the BGP scope of the cost community is true?
A. It is shared with IBGP neighbors only.
B. It is shared with IBGP neighbors and route reflectors.
C. It is shared with EBGP neighbors only.
D. It is shared with IBGP and EBGP neighbors.
E. It is shared with IBGP and confederation peers.
Answer: E
Explanation:
The BGP Cost Community feature introduces the cost extended community attribute. The cost community is a non-transitive extended community attribute that is passed to internal BGP (iBGP) and confederation peers but not to external BGP (eBGP) peers. The cost community feature allows you to customize the local route preference and influence the best path selection process by assigning cost values to specific routes.
Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/s_bgpcc.html
Q142. Refer to the exhibit.
You discover that only 1.5 Mb/s of web traffic can pass during times of congestion on the given network.
Which two options are possible reasons for this limitation? (Choose two.)
A. The web traffic class has too little bandwidth reservation.
B. Video traffic is using too much bandwidth.
C. The service-policy is on the wrong interface.
D. The service-policy is going in the wrong direction.
E. The NAT policy is adding too much overhead.
Answer: A,B
Explanation:
In this example, the web traffic will fall into the default class, which is only 15 percent of the 10Mbps Internet connection (1.5Mbps). Meanwhile, video traffic is allowed 50% of the 10 Mbps.
Q143. Refer to the exhibit.
While troubleshooting high CPU utilization of a Cisco Catalyst 4500 Series Switch, you notice the error message that is shown in the exhibit in the log file.
What can be the cause of this issue, and how can it be prevented?
A. The hardware routing table is full. Redistribute from BGP into IGP.
B. The software routing table is full. Redistribute from BGP into IGP.
C. The hardware routing table is full. Reduce the number of routes in the routing table.
D. The software routing table is full. Reduce the number of routes in the routing table.
Answer: C
Explanation:
L3HWFORWADING-2
Error MessageC4K_L3HWFORWARDING-2-FWDCAMFULL:L3 routing table is full.
Switching to software forwarding.
The hardware routing table is full; forwarding takes place in the software instead. The switch performance might be degraded.
Recommended Action: Reduce the size of the routing table. Enter the ip cef command to return to hardware forwarding.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/31sg/system/message/message/emsg.html
Q144. Which two options are benefits of EIGRP OTP? (Choose two.)
A. It allows EIGRP routers to peer across a service provider without the service provider involvement.
B. It allows the customer EIGRP domain to remain contiguous.
C. It requires only minimal support from the service provider.
D. It allows EIGRP neighbors to be discovered dynamically.
E. It fully supports multicast traffic.
F. It allows the administrator to use different autonomous system numbers per EIGRP domain.
Answer: A,B
Explanation:
EIGRP Over the Top (OTP) allows EIGRP routers to peer across a service provider infrastructure without the SP’s involvement. In fact with OTP, the provider won’t see customer routes at all. EIGRP OTP acts as a provider-independent overlay that transports customer data between the customer’s routers. To the customer, the EIGRP domain is contiguous. A customer’s EIGRP router sits at the edge of the provider cloud, and peers with another EIGRP router a different location across the cloud. Learned routes feature a next hop of the customer router — not the provider. Good news for service providers is that customers can deploy EIGRP OTP with their involvement
Reference: http://ethancbanks.com/2013/08/01/an-overview-of-eigrp-over-the-top-otp/
Q145. Which two statements about 802.1Q tunneling are true? (Choose two.)
A. It requires a system MTU of at least 1504 bytes.
B. The default configuration sends Cisco Discovery Protocol, STP, and VTP information.
C. Traffic that traverses the tunnel is encrypted.
D. It is supported on private VLAN ports.
E. MAC-based QoS and UDLD are supported on tunnel ports.
F. Its maximum allowable system MTU is 1546 bytes.
Answer: A,E
Q146. Refer to the exhibit.
With these configurations for R1 and R2, which statement about PPP authentication is true?
A. Authentication fails because R1 is missing a username and password.
B. R2 responds with the correct authentication credentials.
C. R2 requires authentication from R1.
D. R1 requires authentication from R2.
Answer: C
Explanation:
Only R2 is configured with the “PPP authentication PAP” command so it requires authentication from R1, but R1 does not require authentication from R2.
Q147. DRAG DROP
Drag and drop the IGMPv2 timer on the left to its default value on the right.
Answer:
Q148. Which two statements are true about an EPL? (Choose two.)
A. It is a point-to-point Ethernet connection between a pair of NNIs.
B. It allows for service multiplexing.
C. It has a high degree of transparency.
D. The EPL service is also referred to as E-line.
Answer: C,D
Explanation:
Ethernet private line (EPL) and Ethernet virtual private line (EVPL) are carrier Ethernet data services defined by the Metro Ethernet Forum. EPL provides a point-to-point Ethernet virtual connection (EVC) between a pair of dedicated user–network interfaces (UNIs), with a high degree of transparency. EVPL provides a point-to-point or point-to-multipoint connection between a pair of UNIs. The services are categorized as an E-Line service type, with an expectation of low frame delay, frame delay variation and frame loss ratio. EPL is implemented using a point-to-point (EVC) with no Service Multiplexing at each UNI (physical interface), i.e., all service frames at the UNI are mapped to a single EVC (a.k.a. all-to-one bundling).
Reference: http://en.wikipedia.org/wiki/Ethernet_Private_Line
Q149. Refer to the exhibit.
Which two possible network conditions can you infer from this configuration? (Choose two.)
A. The authentication parameters on R1 and R2 are mismatched.
B. R1 is using the default NTP source configuration.
C. R1 and R2 have established an NTP session.
D. R2 is configured as the NTP master with a stratum of 7.
Answer: A,B
Explanation:
Answer A. The NTP associations are not synced, it is only listed as a candidate because it was configured. Routing is not the issue, so it must be mismatched authentication parameters.
Answer B. NTP sets the source IP address for all NTP packets based on the address of the interface through which the NTP packets are sent. You can configure NTP to use a specific source IP address.
Q150. Which standard feature can be exploited by an attacker to perform network reconnaissance?
A. IP-directed broadcast
B. maintenance operations protocol
C. ICMP redirects
D. source quench
Answer: C