Youre going to get the in depth description when you face troubles during your 400-101 study. Ucertify provide you the 400-101 CCIE Routing and Switching (v5.0) blueprint legibly inside the 400-101 dumps. These types of significantly conserving your costs to get familiar with the Cisco training courses.

2016 Jun 400-101 dumps:

Q321. Which three statements about GLBP are true? (Choose three.) 

A. It uses a virtual MAC address that starts with 0007.b4. 

B. It elects a single active virtual gateway to appoint and manage multiple active virtual forwarders. 

C. It allows the configured virtual IP address to be used on a physical interface as well. 

D. It uses a virtual MAC address that starts with 0070.4b. 

E. It elects multiple active virtual gateways to appoint and manage a single active virtual forwarder. 

F. Preemption is enabled for the configured active virtual gateway by default. 

Answer: A,B,C 


The virtual MAC address in GLBP is 0007.b400.xxyy where xx is the GLBP group number and yy is the different number of each gateway (01, 02, 03…). One of the routers in a GLBP group is elected as an AVG – Active Virtual Gateway. There is only one active AVG in a group, and its task is to respond to ARP requests sent to the virtual gateway IP address replying different virtual MAC addresses in response packets. GLBP allows the configured virtual IP address to be used on a physical interface. By default, the GLBP gateway preemptive scheme is disabled. A backup virtual gateway can become the AVG only if the current AVG fails, regardless of the priorities assigned to the virtual gateways. 

Q322. When deploying redundant route reflectors in BGP, which attribute can you configure on the route reflector to allow routes to be identified as belonging to the same group? 





Answer: B 


Together, a route reflector and its clients form a cluster. When a single route reflector is deployed in a cluster, the cluster is identified by the router ID of the route reflector. The bgp cluster-id command is used to assign a cluster ID to a route reflector when the cluster has one or more route reflectors. Multiple route reflectors are deployed in a cluster to increase redundancy and avoid a single point of failure. When multiple route reflectors are configured in a cluster, the same cluster ID is assigned to all route reflectors. This allows all route reflectors in the cluster to recognize updates from peers in the same cluster and reduces the number of updates that need to be stored in BGP routing tables. 


Q323. Which authentication method does OSPFv3 use to secure communication between neighbors? 

A. plaintext 



D. IPSec 

Answer: D 


In order to ensure that OSPFv3 packets are not altered and re-sent to the device, causing the device to behave in a way not desired by its system administrators, OSPFv3 packets must be authenticated. OSPFv3 uses the IPsec secure socket API to add authentication to OSPFv3 packets. This API supports IPv6. OSPFv3 requires the use of IPsec to enable authentication. Crypto images are required to use authentication, because only crypto images include the IPsec API needed for use with OSPFv3. 



Drag and drop the LACP elements on the left into the correct priority order in the hot-standby port-selection process on the right. 


Q325. Which technology can be affected when switches are used that do not support jumbo frames? 

A. 802.1x 


C. OSPFv3 

D. 802.1q 

Answer: D 


The 802.1Q tag is 4 bytes. Therefore, the resulting Ethernet frame can be as large as 1522 bytes. If jumbo frames are not supported, then typically the MTU on an Ethernet link needs to be lowered to 1496 to support this extra 802.1Q tag. 

400-101 practice exam

Most up-to-date error 400-101:

Q326. When the BGP additional-paths feature is used, what allows a BGP speaker to differentiate between the different available paths? 

A. The remote BGP peer prepends its own next-hop address to the prefix. 

B. A unique path identifier is encoded into a dedicated field to the NLRI. 

C. A route distinguisher is appended to the prefix by the receiving BGP speaker. 

D. The additional path information is encoded in an extended community. 

Answer: B 

Q327. What are two benefits of Per-Tunnel QoS for DMVPN? (Choose two.) 

A. The administrator can configure criteria that, when matched, can automatically set up QoS for each spoke as it comes online. 

B. Traffic from each spoke to the hub can be regulated individually. 

C. When traffic exceeds a configurable threshold, the spokes can automatically set up QoS with the hub. 

D. The hub can send large packets to a spoke during allotted timeframes. 

E. The hub can be regulated to prevent overloading small spokes. 

Answer: A,E 

Q328. Which option is the result if two adjacent routers are configured for OSPF with different process IDs? 

A. The routers are unable to establish an adjacency. 

B. The routers establish an adjacency, but route exchange fails. 

C. The routers establish an adjacency and exchange routes, but the routes are unreachable. 

D. The routers establish an adjacency and exchange routes, and the routes are reachable. 

Answer: D 

Q329. Which two statements about MAC Authentication Bypass are true? (Choose two.) 

A. Traffic from an endpoint is authorized to pass after MAB authenticates the MAC address of the endpoint. 

B. During the learning stage, the switch examines multiple packets from the endpoint to determine the MAC address of the endpoint. 

C. After the switch learns the MAC address of the endpoint, it uses TACACS+ to authenticate it. 

D. After learning a source MAC address, it sends the host a RADIUS Account-Request message to validate the address. 

E. The MAC address of a device serves as its user name and password to authenticate with a RADIUS server. 

Answer: A,E 

Q330. A configuration includes the line ip nbar port-map SSH tcp 22 23 443 8080. Which option describes the effect of this configuration line? 

A. It configures NBAR to search for SSH using ports 22, 23, 443, and 8080. 

B. It configures NBAR to allow SSH connections only on ports 22, 23, 443, and 8080. 

C. It enables NBAR to inspect for SSH connections. 

D. It creates a custom NBAR port-map named SSH and associates TCP ports 22, 23, 443, and 8080 to itself. 

Answer: A 


The ip nbar-port-map command configures NBAR to search for a protocol or protocol name using a port number other than the well-known port. 

Reference: f