Realistic of 400-101 free practice questions materials and torrent for Cisco certification for IT candidates, Real Success Guaranteed with Updated 400-101 pdf dumps vce Materials. 100% PASS CCIE Routing and Switching (v5.0) exam Today!

2016 Dec 400-101 ccie routing and switching written exam fee:

Q561. Which protocol will accept incoming updates when the passive-interface command is configured? 






Q562. Which measure does IS-IS use to avoid sending traffic with a wrong MTU configuration? 

A. IS-IS does not protect from MTU mismatch. 

B. MTU value is communicated in IS-IS Sequence Number PDUs (SNP), and IS-IS adjacency is not established if an MTU mismatch is detected. 

C. IS-IS uses path MTU discovery as specified in RFC 1063. 

D. IS-IS uses padding of hello packets to full MTU. 



Intermediate System-to-Intermediate System (IS-IS) hellos are padded to the full maximum transmission unit (MTU) size. The benefit of padding IS-IS Hellos (IIHs) to the full MTU is that it allows for early detection of errors due to transmission problems with large frames or due to mismatched MTUs on adjacent interfaces. 


Q563. Refer to the exhibit. 

Which statement is true? 

A. This is an MPLS TE point-to-multipoint LSP in an MPLS network. 

B. This is an MPLS TE multipoint-to-point LSP in an MPLS network. 

C. This is a point-to-multipoint LSP in an MPLS network. 

D. This is a multipoint-to-multipoint LSP in an MPLS network. 



Same example of this provided on slide 24 at the reference link below: 

Reference: “mVPN Deployment Models” Cisco Live Presentation, slide 24 

Q564. An NSSA area has two ABRs connected to Area 0. Which statement is true? 

A. Both ABRs translate Type-7 LSAs to Type-5 LSAs. 

B. The ABR with the highest router ID translates Type-7 LSAs to Type-5 LSAs. 

C. Both ABRs forward Type-5 LSAs from the NSSA area to backbone area. 

D. No LSA translation is needed. 


Q565. Refer to the exhibit. 

With these configurations for R1 and R2, which statement about PPP authentication is true? 

A. Authentication fails because R1 is missing a username and password. 

B. R2 responds with the correct authentication credentials. 

C. R2 requires authentication from R1. 

D. R1 requires authentication from R2. 



Only R2 is configured with the “PPP authentication PAP” command so it requires authentication from R1, but R1 does not require authentication from R2. 

Leading ccie dumps 400-101:

Q566. Refer to the exhibit. 

Which two statements about this configuration are true? (Choose two.) 

A. Pings from SW2 to SW1 fail because SW1 is pruning VLAN 10. 

B. VLANs 10 and 200 are added to the SW2 allowed list on interface fa0/22. 

C. Pings from SW2 to SW1 are successful. 

D. Only VLAN 200 is added to the SW1 allowed list on interface fa0/22. 

Answer: B,C 

Q567. Which two statements about route summarization are true? (Choose two.)

A. RIP, IGRP, and EIGRP can automatically summarize routing information at network address boundaries. 

B. EIGRP can automatically summarize external routes. 

C. The area range command can aggregate addresses on the ASBR. 

D. The summary-address command under the router process configures manual summarization on RIPv2 devices. 

E. The ip classless command enables classful protocols to select a default route to an unknown subnet on a network with other known subnets. 

Answer: A,E 

Q568. Which statement is true regarding the UDP checksum? 

A. It is used for congestion control. 

B. It cannot be all zeros. 

C. It is used by some Internet worms to hide their propagation. 

D. It is computed based on the IP pseudo-header. 



The method used to compute the checksum is defined in RFC 768: “Checksum is the 16-bit one's complement of the one's complement sum of a pseudo header of information from the IP header, the UDP header, and the data, padded with zero octets at the end (if necessary) to make a multiple of two octets.” In other words, all 16-bit words are summed using one's complement arithmetic. Add the 16-bit values up. Each time a carry-out (17th bit) is produced, swing that bit around and add it back into the least significant bit. The sum is then one's complemented to yield the value of the UDP checksum field. If the checksum calculation results in the value zero (all 16 bits 0) it should be sent as the one's complement (all 1s). 


Q569. Which two attributes were introduced with the Cisco IOS BGP 4-byte ASN feature? (Choose two.) 






Answer: A,B 

Q570. Which statement about the EIGRP RTO is true? 

A. It is six times the SRTT. 

B. It is the time that it normally takes for an update to be received by a peer. 

C. It is the time that it normally takes to receive a reply to a query. 

D. It is the average time that it takes for a reliable packet to be acknowledged. 



The RTO is typically six times the SRTT, the value may vary from a minimum of 200 microseconds (ms) to a maximum of 5 seconds (s). 

Reference: EIGRP for IP: Basic Operation and Configuration, Alvaro Retana, Russ White, Don Slice - 2000