★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/400-101-dumps.html
Examcollection provides an individual the Cisco certification exam questions and answers in Pdf platforms and Check Engine platforms. After downloading and installing these people on your PC, you are able to practise Cisco 400-101 test questions; evaluate your questions & answers and check your current score. If you knowledge some issues, seek the Cisco 400-101 examine guide with regard to help. Your distinctive feature is actually that the Cisco Cisco 400-101 on-line test powerplant creates a nearly genuine exam environment. Using Cisco Cisco online training is a rapid and effective way to put together the Cisco certification exam. You are able to through apart the extended Cisco 400-101 books or dont need to acquire other 400-101 courses. Studying your Cisco 400-101 practice materials for your own rate and together with your own fashion because the Cisco test powerplant is flexible.Your price of the Cisco Cisco certification exam dumps is fair. We offer you in which what you get got from Examcollection is actually more than beneficial. The Cisco 400-101 exam Pdf files is quite convenient to suit your needs in that theyre a magic formula for the preparation of the 400-101 certification exam. Our objective is to help your customers get the Cisco certification and help to make them satisfied.
2021 Sep 400-101 ccie dumps free download:
Q191. DRAG DROP
Drag and drop the NHRP flag on the left to the corresponding meaning on the right.
Answer:
Q192. When you implement CoPP on your network, what is its default action?
A. permit all traffic
B. rate-limit bidirectional traffic to the control plane
C. drop management ingress traffic to the control plane
D. monitor ingress and egress traffic to the control plane by using access groups that are applied to the interface
E. block all traffic
Answer: A
Q193. Which statement about the overload bit in IS-IS is true?
A. The IS-IS adjacencies on the links for which the overload bit is set are brought down.
B. Routers running SPF ignore LSPs with the overload bit set and hence avoid blackholing traffic.
C. A router setting the overload bit becomes unreachable to all other routers in the IS-IS area.
D. The overload bit in IS-IS is used only for external prefixes.
Answer: B
Explanation:
The OL bit is used to prevent unintentional blackholing of packets in BGP transit networks. Due to the nature of these protocols, IS-IS and OSPF converge must faster than BGP. Thus there is a possibility that while the IGP has converged, IBGP is still learning the routes. In that case if other IBGP routers start sending traffic towards this IBGP router that has not yet completely converged it will start dropping traffic. This is because it isnt yet aware of the complete BGP routes. OL bit comes handy in such situations. When a new IBGP neighbor is added or a router restarts, the IS-IS OL bit is set. Since directly connected (including loopbacks) addresses on an “overloaded” router are considered by other routers, IBGP can be bought up and can begin exchanging routes. Other routers will not use this router for transit traffic and will route the packets out through an alternate path. Once BGP has converged, the OL bit is cleared and this router can begin forwarding transit traffic.
Reference: https://routingfreak.wordpress.com/category/ospf-vs-is-is/
Q194. Refer to the exhibit.
Which two configuration changes enable the user admin to log in to the device? (Choose two.)
A. Configure the login authentication to be case-insensitive.
B. Configure the user admin with a password and appropriate privileges.
C. Configure the login authentication to be case-sensitive.
D. Modify the configuration to use a named group.
E. Configure additional login authentication under the terminal lines.
Answer: A,B
Explanation:
Usernames and passwords are case-sensitive. Users attempting to log in with an incorrectly cased username or password will be rejected. If users are unable to log into the router with their specific passwords, reconfigure the username and password on the router.
Reference: http://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-software-releases-110/45843-configpasswords.html
Q195. Refer to the exhibit.
Which three statements about the output are true? (Choose three.)
A. This switch is currently receiving a multicast data stream that is being forwarded out VLAN 150.
B. A multicast receiver has requested to join one or more of the multicast groups.
C. Group 224.0.1.40 is a reserved address, and it should not be used for multicast user data transfer.
D. One or more multicast groups are operating in PIM dense mode.
E. One or more of the multicast data streams will be forwarded out to neighbor 10.85.20.20.
F. Group 239.192.1.1 is a reserved address, and it should not be used for multicast user data transfer.
Answer: A,B,C
Explanation:
A. VLAN 150 shows up in the outgoing interface list so those specific multicast streams are being forwarded to this VLAN.
B. A receiver has requested to receive the multicast stream associated with the multicast address of 239.192.1.1, that is why this stream appears in the mroute table.
C. The 224.0.1.40 is a reserved multicast group for cisco's Rp descovery. All cisco routers are members of this grup by default and listen to this group for Cisco RP discovery messages advertised by mapping agent even if it is not configured
Regenerate cisco 400-101:
Q196. Which two statements about device access control are true? (Choose two.)
A. The AUX port is displayed as type tty in the output of the show line command.
B. VTY lines are associated with physical interfaces on a network device.
C. MPP restricts device-management access to interfaces that are configured under the control plane host configuration.
D. The enable password command sets an MD5 one-way encrypted password.
E. The console port supports hardware flow control
Answer: C,E
Q197. DRAG DROP
Drag and drop each BGP attribute on the left to the matching description on the right.
Answer:
Q198. Which two statements about PIM-DM are true? (Choose two.)
A. It forwards multicast packets on a source tree.
B. It requires an RP.
C. It forwards multicast packets on a shared distribution tree.
D. It floods multicast packets to neighbors that have requested the data.
E. It floods multicast packets throughout the network.
F. It forwards multicast packets to neighbors that have requested the data.
Answer: A,E
Q199. On which three options can Cisco PfR base its traffic routing? (Choose three.)
A. Time of day
B. An access list with permit or deny statements
C. Load-balancing requirements
D. Network performance
E. User-defined link capacity thresholds
F. Router IOS version
Answer: C,D,E
Explanation:
Key Advantages of using PfR for Load balancing:
. Utilization based load-balancing: PfR takes real-time link utilization into account when load balancing the links. This will ensure that a link will not go beyond a certain percentage of its maximum capacity (75% by default).
. Application Performance based Load Balancing: PfR does not randomly forward traffic through one link or another. It takes application performance requirements into consideration and then forwards the traffic through a link which meets the performance policy requirements. PfR also load balances the link at the same time.
. Bi-directional Solution: PfR is a bi-directional load balancing solution which influences outbound as well as in-bound traffic.
. Consolidated Centralized View: PfR offers consolidated and centralized view of the state of all external links in the network. At any given time, the network administrator can see the current link utilization (in kbps and percentage of its capacity), maximum link threshold, and the policies applied to the links in the network.
Reference: http://docwiki.cisco.com/wiki/PfR:Solutions:InternetOutboundLoadBalancing
Q200. Which three capabilities are provided by MLD snooping? (Choose three.)
A. dynamic port learning
B. IPv6 multicast router discovery
C. user-configured ports age out automatically
D. a 5-minute aging timer
E. flooding control packets to the egress VLAN
F. a 60-second aging timer
Answer: A,B,D
Explanation:
Like IGMP snooping, MLD snooping performs multicast router discovery, with these characteristics:
. Ports configured by a user never age out.
. Dynamic port learning results from MLDv1 snooping queries and IPv6 PIMv2 packets.
. If there are multiple routers on the same Layer 2 interface, MLD snooping tracks a single multicast router on the port (the router that most recently sent a router control packet).
. Dynamic multicast router port aging is based on a default timer of 5 minutes; the multicast router is deleted from the router port list if no control packet is received on the port for 5 minutes.
. IPv6 multicast router discovery only takes place when MLD snooping is enabled on the switch.
Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750/software/release/12-2_55_se/configuration/guide/scg3750/swv6mld.pdf