Vivid of 400-101 practice exam materials and answers for Cisco certification for consumer, Real Success Guaranteed with Updated 400-101 pdf dumps vce Materials. 100% PASS CCIE Routing and Switching (v5.0) exam Today!
2016 Sep ccie written exam:
Q501. DRAG DROP
Drag and drop the IPv6 address on the left to the correct IPv6 address type on the right.
Q502. Which service is disabled by the no service tcp-small-servers command?
A. the finger service
B. the Telnet service
C. the Maintenance Operation Protocol service
D. the chargen service
The TCP small servers are: . Echo: Echoes back whatever you type through the telnet x.x.x.x echo command.
. Chargen: Generates a stream of ASCII data. Use the telnet x.x.x.x chargen Command.
. DiscarD. Throws away whatever you type. Use the telnet x.x.x.x discard command.
. DaytimE. Returns system date and time, if it is correct. It is correct if you run Network Time Protocol (NTP), or have set the date and time manually from the exec level. Use the telnet x.x.x.x daytime command.
Q503. Which three options are sub-subfields of the IPv4 Option Type subfield? (Choose three.)
A. Option Class
E. Option Number
Each IP option has its own subfield format, generally structured as shown below. For most options, all three subfields are used. Option Type, Option Length and Option Data.
Q504. What is the function of an implicit-null label?
A. It notifies the upstream LSR to remove the top label in the label stack and forward the packet.
B. It notifies the upstream LSR to add a VPN label to the label stack.
C. It is used to statically assign a label to an IGP route.
D. It is used to identify the router ID.
Q505. DRAG DROP
Drag each OSPF route-type identifier on the left to its description on the right.
Rebirth latest ccie r&s dumps:
Q506. Which value is the maximum segment size if you start with an MTU of 1500 bytes and then remove the overhead of the Ethernet header, IP header, TCP header, and the MAC frame check sequence?
A. 1434 bytes
B. 1460 bytes
C. 1458 bytes
D. 1464 bytes
Q507. Which two statements about VPLS are true? (Choose two.)
A. Split horizon is used on PE devices to prevent loops.
B. Spanning tree is extended from CE to CE.
C. IP is used to switch Ethernet frames between sites.
D. PE routers dynamically associate to peers.
E. VPLS extends a Layer 2 broadcast domain.
Q508. DRAG DROP
Drag and drop each PHB on the left to the functionality it performs on the right.
Q509. Independent, multiple OSPF processes are entered on the same router, and the processes have the same destination route. Which OSPF process is used?
A. The route with the fewest hops is used.
B. Both processes are used to load balance the traffic.
C. The first route process that places a route into the routing table is used.
D. The route with the shortest prefix is used.
Q510. In GETVPN, which key is used to secure the control plane?
A. Traffic Encryption Key (TEK)
B. content encryption key (CEK)
C. message encryption key (MEK)
D. Key Encryption Key (KEK).
GDOI introduces two different encryption keys. One key secures the GET VPN control plane; the other key secures the data traffic. The key used to secure the control plane is commonly called the Key Encryption Key (KEK), and the key used to encrypt data traffic is known as Traffic Encryption Key (TEK).
Reference: Group Encrypted Transport VPN (Get VPN) Design and Implementation Guide PDF