What Refresh 400-101 Is?

Free Instant Download NEW 70-490 Exam Dumps (PDF & VCE):
Available on: https://www.certifytools.com/400-101-exam.html

Actualtests offers essentially the most reliable and also high-quality Cisco 400-101 practice dumps for Cisco certification exam. Any large amount of customers have faith in our Cisco Cisco products. We are confident with the quality associated with our Cisco Cisco items and that is actually why all of us offer the no hassle 30 days Money Back Assure. If you fail the Cisco exam after buying our items, we will refund the entire amount. Actualtests has got the utmost source associated with Cisco 400-101 exam questions and answers. These kinds of understandable Cisco 400-101 study resources are offered in downloadable Pdf formatting which is straightforward to utilize.

2017 Mar 400-101 exam answers

Q301. Refer to the exhibit. 

Which log levels are enabled for the console? 

A. informational only 

B. informational and debugging 

C. informational, debugging, notifications, warnings, errors, critical, alerts, and emergencies 

D. informational, notifications, warnings, errors, critical, alerts, and emergencies 

Answer:


Q302. Which VPN technology requires the use of an external key server? 

A. GETVPN 

B. GDOI 

C. SSL 

D. DMVPN 

E. IPsec F. L2TPv3 

Answer:

Explanation: 

A GETVPN deployment has primarily three components, Key Server (KS), Group Member (GM), and Group Domain of Interpretation (GDOI) protocol. GMs do encrypt/decrypt the traffic and KS distribute the encryption key to all the group members. The KS decides on one single data encryption key for a given life time. Since all GMs use the same key, any GM can decrypt the traffic encrypted by any other GM. GDOI protocol is used between the GM and KS for group key and group SA management. Minimum one KS is required for a GETVPN deployment. 

Reference: http://www.cisco.com/c/en/us/products/collateral/security/group-encrypted-transport-vpn/deployment_guide_c07_554713.html 


Q303. Refer to the exhibit. 

Which statement is true about the downward bit? 

A. It forces the CE router to use a backup link instead of sending traffic via MPLS VPN. 

B. It informs the PE router that the LSA metric has been recently decreased to 1 and that partial SPF calculation cannot be delayed. 

C. It forces the CE router to install the LSA with the downward bit set into its routing table as a discard route. 

D. It informs the PE router that the LSA was already redistributed into BGP by another PE router and that the LSA must not be redistributed into BGP again. 

Answer:

Explanation: 

From RFC 4577, specifically section 4.2.5.1 

When a type 3 LSA is sent from a PE router to a CE router, the DN bit [OSPF-DN] in the LSA Options field MUST be set. This is used to ensure that if any CE router sends this type 3 LSA to a PE router, the PE router will not redistribute it further. 

When a PE router needs to distribute to a CE router a route that comes from a site outside the latter’s OSPF domain, the PE router presents itself as an ASBR (Autonomous System Border Router), and distributes the route in a type 5 LSA. The DN bit [OSPF-DN] MUST be set in these LSAs to ensure that they will be ignored by any other PE routers that receive them. 


Q304. Which statement about NAT64 is true? 

A. It uses one-to-one mapping between IPv6 addresses and IPv4 addresses. 

B. It requires static address mapping between IPv6 addresses and IPv4 addresses. 

C. It can be used to translate an IPv6 network to another IPv6 network. 

D. It can be configured for stateless and stateful translation. 

Answer:


Q305. DRAG DROP 

Drag and drop the argument of the mls ip cef load-sharing command on the left to the function it performs on the right. 

Answer: 


Regenerate 400-101 free exam questions:

Q306. Refer to the exhibit. 

If OSPF is implemented on the network, which additional configuration is needed to allow traffic from host 10.4.1.15/24 to host 10.1.2.20/24? 

A. A virtual link between router 2 and router 4 

B. A virtual link between router 3 and router 4 

C. A virtual link between router 2 and router 3 

D. The current design allows traffic between the two hosts. 

Answer:

Explanation: 

This specific traffic from 10.4.1.0/24 to 10.1.2.0/24 would work because this traffic crosses only over the single OSPF area of 0.0.0.1. 

However, traffic from hosts on R4 to R1 would indeed need a virtual link, since area 0.0.0.2 is not connected to the backbone area of 0.0.0.0. 


Q307. DRAG DROP 

Drag and drop the Cisco IOS XE subpackage on the left to the function it performs on the right. 

Answer: 


Q308. Which two statements about the metric-style wide statement as it applies to route redistribution are true? (Choose two.) 

A. It is used in IS-IS. 

B. It is used in OSPF. 

C. It is used in EIGRP. 

D. It is used for accepting TLV. 

E. It is used in PIM for accepting mroutes. 

F. It is used for accepting external routes. 

Answer: A,D 

Explanation: 

To configure a router running IS-IS to generate and accept only new-style TLVs (TLV stands for type, length, and value object), use the metric-style wide command. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/TE_1208S.html#wp49409 


Q309. Refer to the exhibit. 

What happens to packets when traffic in the icmp-class class exceeds the policed amount? 

A. Packets are discarded and a message is logged. 

B. Packets are discarded and a trap is sent to any servers that are configured to receive traps. 

C. Packets are discarded silently. 

D. Packets are discarded and an inform is sent to any servers that are configured to receive informs. 

Answer:

Explanation: 

service-policy {input| output policy-map-name Example: 

Router(config-cp)# service-policy input control-plane-policy 

Attaches a QoS service policy to the control plane. Note the following points: 

. input --Applies the specified service policy to packets received on the control plane. 

. output --Applies the specified service policy to packets transmitted from the control plane and enables the router to silently discard packets. 

. policy-map-name --Name of a service policy map (created using the policy-mapcommand) to be attached. The name can be a maximum of 40 alphanumeric characters. 

In this case, the service policy is set to output, which drops the traffic silently per above. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/qos_plcshp/configuration/15-mt/qos-plcshp-15-mt-book/qos-plcshp-ctrl-pln-plc.html 


Q310. DRAG DROP 

Drag and drop the VLAN number on the left to the corresponding default VLAN name on the right. 

Answer: 


Get More Information : Get 400-101 now

Money Back Guarantee

Guarantee

CertifyForAll has a remarkable Candidate Success record. We're confident of our products and provide a no hassle money back guarantee.

Who Chooses CertifyForAll

CertifyForAll is the world's largest certification preparation company with 99.3% Pass Rate History from 170344+ Satisfied Customers in 145 Countries.

EXE exam format