★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/400-101-dumps.html


Work with Ucertify Cisco 400-101 check questions to connection this product Quality. You wont refuse getting the 400-101 Assessment Thoughts because it?¡¥s the supreme on-line 400-101 Examine Product. Many an online success 400-101 test takers currently have transferred their particular actual 400-101 Assessment with this 400-101, and therefore will you!

2021 Mar 400-101 exam fees

Q1. Which option is true about output policing for the control plane? 

A. It improves router performance by limiting traffic sent to the control plane. 

B. It improves router performance by limiting traffic sent from the control plane. 

C. It improves router performance by limiting traffic sent to and from the control plane. 

D. It controls traffic originated from the router. 

Answer:


Q2. Refer to the exhibit. 

If the downstream router has a summary route configured, which two actions must you take on the local router to create the summary route that summarizes all routes from the downstream router? (Choose two.) 

A. Configure the summary address on the interface. 

B. Use 10.0.0.0 255.248.0.0 as the summary route. 

C. Configure the summary address in the EIGRP process. 

D. Use 10.0.0.0 255.252.0.0 as the summary route. 

E. Configure a route map to permit the route. 

F. Configure a distribute list in. 

Answer: A,B 

Explanation: 

Route summarization works in conjunction with the ip summary-address eigrp interface configuration command, in which additional summarization can be performed. To correctly summarize all the networks shown, the correct route to use is 10.0.0.0 255.248.0.0 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/ip/configuration/guide/fipr_c/1cfeigrp.html 


Q3. Which two statements are true about VPLS? (Choose two.) 

A. It can work over any transport that can forward IP packets. 

B. It provides integrated mechanisms to maintain First Hop Resiliency Protocols such as HSRP, VRRP, or GLBP. 

C. It includes automatic detection of multihoming. 

D. It relies on flooding to propagate MAC address reachability information. 

E. It can carry a single VLAN per VPLS instance. 

Answer: D,E 

Explanation: 

VPLS relies on flooding to propagate MAC address reachability information. Therefore, flooding cannot be prevented. 

VPLS can carry a single VLAN per VPLS instance. To multiplex multiple VLANs on a single instance, VPLS uses IEEE QinQ. 

Reference: http://www.cisco.com/c/en/us/products/collateral/switches/nexus-7000-series-switches/white_paper_c11-574984.html 


Q4. DRAG DROP 

Drag and drop each EIGRP element on the left to the corresponding definition on the right. 

Answer: 


Q5. Which two fields reside in the initial CHAP challenge packet? (Choose two.) 

A. the authentication name of the challenger 

B. a random hash value generated by the device 

C. the hashed packet type ID 

D. the packet type ID in clear text 

Answer: A,D 

Explanation: 

When a caller A dials in to an access server B, The Access server sends across the link an initial Type 1 authentication packet called a Challenge. This Challenge packet contains a randomly generated number, an ID sequence number to identify the challenge (sent in clear text) and the authentication name of the challenger. 

Reference: http://www.rhyshaden.com/ppp.htm 


Rebirth 400-101 exam answers:

Q6. Which three options are components of an EEM CLI policy? (Choose three.) 

A. Safe-Tcl 

B. applet name 

C. Fast Tcl 

D. event 

E. action 

F. Tcl bytecode 

Answer: B,D,E 

Explanation: 

The Embedded Event Manager (EEM) monitors events that occur on your device and takes action to recover or troubleshoot these events, based on your configuration. 

EEM consists of three major components: 

Event statements — Events to monitor from another Cisco NX-OS component that might require some action, workaround, or notification. 

Action statements — An action that EEM can take, such as sending an e-mail, or disabling an interface, to recover from an event. 

Policies — An applet name paired with one or more actions to troubleshoot or recover from the event. 

Reference: 

http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5500/sw/system_manage ment/6x/b_5500_System_Mgmt_Config_6x/b_5500_System_Mgmt_Config_6x_chapter_01 0011.html 


Q7. Which three capabilities are provided by MLD snooping? (Choose three.) 

A. dynamic port learning 

B. IPv6 multicast router discovery 

C. user-configured ports age out automatically 

D. a 5-minute aging timer 

E. flooding control packets to the egress VLAN 

F. a 60-second aging timer 

Answer: A,B,D 

Explanation: 

Like IGMP snooping, MLD snooping performs multicast router discovery, with these characteristics: 

. Ports configured by a user never age out. 

. Dynamic port learning results from MLDv1 snooping queries and IPv6 PIMv2 packets. 

. If there are multiple routers on the same Layer 2 interface, MLD snooping tracks a single multicast router on the port (the router that most recently sent a router control packet). 

. Dynamic multicast router port aging is based on a default timer of 5 minutes; the multicast router is deleted from the router port list if no control packet is received on the port for 5 minutes. 

. IPv6 multicast router discovery only takes place when MLD snooping is enabled on the switch. 

Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750/software/release/12-2_55_se/configuration/guide/scg3750/swv6mld.pdf 


Q8. What are two benefits of Per-Tunnel QoS for DMVPN? (Choose two.) 

A. The administrator can configure criteria that, when matched, can automatically set up QoS for each spoke as it comes online. 

B. Traffic from each spoke to the hub can be regulated individually. 

C. When traffic exceeds a configurable threshold, the spokes can automatically set up QoS with the hub. 

D. The hub can send large packets to a spoke during allotted timeframes. 

E. The hub can be regulated to prevent overloading small spokes. 

Answer: A,E 


Q9. What happens when an interface is configured as passive in OSPF? 

A. No OSPF neighbor ship is formed on the interface. 

B. An OSPF neighbor ship is formed with the DR, but not with the BDR. 

C. The subnet configured on the interface is not advertised to any other neighbor. 

D. OSPF hello messages are sent as unicast instead of multicast. 

Answer:


Q10. In an STP domain, which two statements are true for a nonroot switch, when it receives a configuration BPDU from the root bridge with the TC bit set? (Choose two.) 

A. It sets the MAC table aging time to max_age + forward_delay time. 

B. It sets the MAC table aging time to forward_delay time. 

C. It recalculates the STP topology upon receiving topology change notification from the root switch. 

D. It receives the topology change BPDU on both forwarding and blocking ports. 

Answer: B,D 

Explanation: 

When the TC bit is received, every bridge is then notified and reduces the aging time to forward_delay (15 seconds by default) for a certain period of time (max_age + forward_delay). It is more beneficial to reduce the aging time instead of clearing the table because currently active hosts, that effectively transmit traffic, are not cleared from the table. Once the root is aware that there has been a topology change event in the network, it starts to send out its configuration BPDUs with the topology change (TC) bit set. These BPDUs are relayed by every bridge in the network with this bit set. As a result all bridges become aware of the topology change situation and it can reduce its aging time to forward_delay. Bridges receive topology change BPDUs on both forwarding and blocking ports. An important point to consider here is that a TCN does not start a STP recalculation. This fear comes from the fact that TCNs are often associated with unstable STP environments; TCNs are a consequence of this, not a cause. The TCN only has an impact on the aging time. It does not change the topology nor create a loop. 

Reference: http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/12013-17.html#topic1