★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/400-101-dumps.html


Exam Code: 400-101 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CCIE Routing and Switching (v5.0)
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass 400-101 Exam.

2021 Sep ccie 400 101:

Q21. Which two OSPF network types require the use of a DR and BDR? (Choose two.) 

A. non-broadcast networks 

B. point-to-point networks 

C. point-to-multipoint networks 

D. broadcast networks 

E. point-to-multipoint non-broadcast networks 

Answer: A,D 


Q22. What is the preferred method to improve neighbor loss detection in EIGRP? 

A. EIGRP natively detects neighbor down immediately, and no additional feature or configuration is required. 

B. BFD should be used on interfaces that support it for rapid neighbor loss detection. 

C. Fast hellos (subsecond) are preferred for EIGRP, so that it learns rapidly through its own mechanisms. 

D. Fast hellos (one-second hellos) are preferred for EIGRP, so that it learns rapidly through its own mechanisms. 

Answer: B 

Explanation: 

Bi-directional Forwarding Detection (BFD) provides rapid failure detection times between forwarding engines, while maintaining low overhead. It also provides a single, standardized method of link/device/protocol failure detection at any protocol layer and over any media. 

Reference: “Bidirectional Forwarding Detection for EIGRP” 

http://www.cisco.com/en/US/technologies/tk648/tk365/tk207/technologies_white_paper090 0aecd80243fe7.html 


Q23. Which two statements about the default router settings for SSH connections are true? (Choose two.) 

A. The default timeout value for the SSH negotiation phase is 120 seconds. 

B. Data is exchanged in clear text by default unless AAA authentication is enabled on the console. 

C. The default number of authentication retries is 3. 

D. SSH is enabled by default when you configure the username command. 

Answer: A,C 

Explanation: 

ip ssh {timeout seconds | authentication-retries number} 

Configures the SSH control parameters: 

. Specify the time-out value in seconds; the default is 120 seconds. The range is 0 to 120 seconds. This parameter applies to the SSH negotiation phase. After the connection is established, the Switch uses the default time-out values of the CLI-based sessions. By default, up to five simultaneous, encrypted SSH connections for multiple CLI-based sessions over the network are available (session 0 to session 4). After the execution shell starts, the CLI-based session time-out value returns to the default of 10 minutes. 

. Specify the number of times that a client can re-authenticate to the server. The default is 3; the range is 0 to 5. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3850/software/release/3se/secur ity/configuration_guide/b_sec_3se_3850_cg/b_sec_3se_3850_cg_chapter_01000.html 


Q24. Which type of EIGRP routes are summarized by the auto-summary command? 

A. internal routes that are learned from a peer that is outside the range of local network statements 

B. external routes that are learned from a peer that is inside the range of local network statements 

C. locally created routes that are outside the range of local network statements 

D. external routes that are learned from a peer that is outside the range of local network statements 

Answer: B 

Explanation: 

Auto-Summarization of External Routes 

EIGRP will not auto-summarize external routes unless there is a component of the same major network that is an internal route. To illustrate, let us look at Figure 15. 


Router Three is injecting external routes to 192.1.2.0/26 and 192.1.2.64/26 into EIGRP using the redistribute connected command, as shown in the configurations below. 

Router Three 

interface Ethernet0 

ip address 192.1.2.1 255.255.255.192 

interface Ethernet1 

ip address 192.1.2.65 255.255.255.192 

interface Ethernet2 

ip address 10.1.2.1 255.255.255.0 

!router eigrp 2000 

redistribute connected 

network 10.0.0.0 

default-metric 10000 1 255 1 1500 

With this configuration on Router Three, the routing table on Router One shows: 

one# show ip route 

10.0.0.0/8 is subnetted, 2 subnets 

D 10.1.2.0 [90/11023872] via 10.1.50.2, 00:02:03, Serial0 

C 10.1.50.0 is directly connected, Serial0 

192.1.2.0/26 is subnetted, 1 subnets 

D EX 192.1.2.0 [170/11049472] via 10.1.50.2, 00:00:53, Serial0 

D EX 192.1.2.64 [170/11049472] via 10.1.50.2, 00:00:53, Serial0 

Although auto-summary normally causes Router Three to summarize the 192.1.2.0/26 and 192.1.2.64/26 routes into one major net destination (192.1.2.0/24), it does not do this because both routes are external. However, if you reconfigure the link between Routers Two and Three to 192.1.2.128/26, and add network statements for this network on Routers Two and Three, the 192.1.2.0/24 auto-summary is then generated on Router Two. 

Router Three 

interface Ethernet0 

ip address 192.1.2.1 255.255.255.192 

interface Ethernet1 

ip address 192.1.2.65 255.255.255.192 

interface Serial0 

ip address 192.1.2.130 255.255.255.192 

router eigrp 2000 network 192.1.2.0 

Now Router Two generates the summary for 192.1.2.0/24: 

two# show ip route 

D 192.1.2.0/24 is a summary, 00:06:48, Null0 

And Router One shows only the summary routE. 

one# show ip route 

10.0.0.0/8 is subnetted, 1 subnets 

C 10.1.1.0 is directly connected, Serial0 

D 192.1.2.0/24 [90/11023872] via 10.1.50.2, 00:00:36, Serial0 

Reference: http://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/16406-eigrp-toc.html 


Q25. DRAG DROP 

Drag each show command on the left to the description of its output on a PE router on the right. 


Answer: 



400-101 study guide

Renewal ccie pdf download:

Q26. Which statement is true regarding the UDP checksum? 

A. It is used for congestion control. 

B. It cannot be all zeros. 

C. It is used by some Internet worms to hide their propagation. 

D. It is computed based on the IP pseudo-header. 

Answer: D 

Explanation: 

The method used to compute the checksum is defined in RFC 768: “Checksum is the 16-bit one's complement of the one's complement sum of a pseudo header of information from the IP header, the UDP header, and the data, padded with zero octets at the end (if necessary) to make a multiple of two octets.” In other words, all 16-bit words are summed using one's complement arithmetic. Add the 16-bit values up. Each time a carry-out (17th bit) is produced, swing that bit around and add it back into the least significant bit. The sum is then one's complemented to yield the value of the UDP checksum field. If the checksum calculation results in the value zero (all 16 bits 0) it should be sent as the one's complement (all 1s). 

Reference: http://en.wikipedia.org/wiki/User_Datagram_Protocol 


Q27. DRAG DROP 

Drag and drop the IPv6 multicast feature on the left to its corresponding function on the right. 


Answer: 



Q28. Which statement is true about VPLS? 

A. MPLS is not required for VPLS to work. 

B. VPLS carries packets as Layer 3 multicast. 

C. VPLS has been introduced to address some shortcomings of OTV. 

D. VPLS requires an MPLS network. 

Answer: D 

Explanation: 

VPLS uses MPLS labels so an MPLS network is required. VPLS MPLS packets have a two-label stack. The outer label is used for normal MPLS forwarding in the service provider's network. If BGP is used to establish the VPLS, the inner label is allocated by a PE as part of a label block. If LDP is used, the inner label is a virtual circuit ID assigned by LDP when it first established a mesh between the participating PEs. Every PE keeps track of assigned inner label, and associates these with the VPLS instance. 

Reference: http://en.wikipedia.org/wiki/Virtual_Private_LAN_Service 


Q29. Which action does route poisoning take that serves as a loop-prevention method? 

A. It immediately sends routing updates with an unreachable metric to all devices. 

B. It immediately sends routing updates with a metric of 255 to all devices. 

C. It prohibits a router from advertising back onto the interface from which it was learned. 

D. It advertises a route with an unreachable metric back onto the interface from which it was learned. 

E. It poisons the route by tagging it uniquely within the network. 

Answer: A 

Explanation: 

With route poisoning, when a router detects that one of its connected routes has failed, the router will poison the route by assigning an infinite metric to it and advertising it to neighbors. 


Q30. In which two situations is an EIGRP hello packet sent as unicast? (Choose two.) 

A. during neighbor discovery 

B. when link costs change 

C. when the neighbor command is used 

D. when an ACK is sent 

Answer: C,D