Cause all that matters here is passing the Cisco 400-101 exam. Cause all that you need is a high score of 400-101 CCIE Routing and Switching (v5.0) exam. The only one thing you need to do is downloading Exambible 400-101 exam study guides now. We will not let you down with our money-back guarantee.
2017 Mar 400-101 exam guide
Q91. Refer to the exhibit.
While configuring AAA with a local database, users can log in via Telnet, but receive the message "error in authentication" when they try to go into enable mode. Which action can solve this problem?
A. Configure authorization to allow the enable command.
B. Use aaa authentication login default enable to allow authentication when using the enable command.
C. Verify whether an enable password has been configured.
D. Use aaa authentication enable default enable to allow authentication when using the enable command.
If a different enable password is configured, it will override the privilege level 15 of that user and force the existing password to be used for enable access.
Q92. Which two discovery mechanism does LDP support? (Choose two.)
Q93. How many bytes comprise the system ID within an IS-IS NET?
A. 4 bytes
B. 6 bytes
C. 8 bytes
D. 16 bytes
E. 20 bytes
Routers are identified with NETs of 8 to 20 bytes. ISO/IEC 10589 distinguishes only three fields in the NSAP address format: a variable-length area address beginning with a single octet, a system ID, and a 1-byte n-selector. Cisco implements a fixed length of 6 bytes for the system ID, which is like the OSPF router ID.
Reference: http://www.cisco.com/en/US/products/ps6599/products_white_paper09186a00800a3e6f.sh tml
Q94. Which two values must be identical to allow IS-IS devices to become neighbors? (Choose two.)
A. interface MTU
B. authentication key
C. IP MTU
D. CLNS address
F. area ID
Q95. Refer to the exhibit.
A Cisco Catalyst 6500 Series Switch experiences high CPU utilization. What can be the cause of this issue, and how can it be prevented?
A. The hardware routing table is full. Redistribute from BGP into IGP.
B. The software routing table is full. Redistribute from BGP into IGP.
C. The hardware routing table is full. Reduce the number of routes in the routing table.
D. The software routing table is full. Reduce the number of routes in the routing table.
FIB TCAM Exception - If you try to install more routes than are possible into the FIB TCAM you will see the following error message in the logs:
CFIB-SP-STBY-7-CFIB_EXCEPTION : FIB TCAM exception, Some entries will be software switched
%CFIB-SP-7-CFIB_EXCEPTION : FIB TCAM exception, Some entries will be software switched.
%CFIB-SP-STBY-7-CFIB_EXCEPTION : FIB TCAM exception, Some entries will be software switched.
This error message is received when the amount of available space in the TCAM is exceeded. This results in high CPU. This is a FIB TCAM limitation. Once TCAM is full, a flag will be set and FIB TCAM exception is received. This stops from adding new routes to the TCAM. Therefore, everything will be software switched. The removal of routes does not help resume hardware switching. Once the TCAM enters the exception state, the system must be reloaded to get out of that state. You can view if you have hit a FIB TCAM exception with the following command:
6500-2#sh mls cef exception status
Current IPv4 FIB exception state = TRUE
Current IPv6 FIB exception state = FALSE
Current MPLS FIB exception state = FALSE
When the exception state is TRUE, the FIB TCAM has hit an exception.
The maximum routes that can be installed in TCAM is increased by the mls cef maximum-routes command.
Most up-to-date 400-101 free practice exam:
Q96. Which statement about traffic management when PIM snooping is enabled is true?
A. Traffic is restricted to host ports.
B. All multicast traffic is flooded to the designated router.
C. Join message are flooded to all routers.
D. Designated routers receive traffic only from groups through which a join message is received.
Q97. Which two tasks are required for configuring SNMP to send traps on a Cisco IOS device? (Choose two.)
A. Create access controls for an SNMP community.
B. Configure SNMP notifications.
C. Configure the SNMP agent.
D. Configure SNMP status monitoring and troubleshooting.
E. Configure SNMP server group names.
F. Configure the SNMP server engine ID.
The best current practices recommend applying Access Control Lists (ACLs) to community strings and ensuring that the requests community strings are not identical to notifications community strings. Access lists provide further protection when used in combination with other protective measures. This example sets up ACL to community string:
access-list 1 permit 220.127.116.11 snmp-server community string1 ro 1
. SNMP Notifications
A key feature of SNMP is the ability to generate notifications from an SNMP agent. These notifications do not require that requests be sent from the SNMP manager. Unsolicited (asynchronous) notifications can be generated as traps or inform requests. Traps are messages alerting the SNMP manager to a condition on the network. Inform requests (informs) are traps that include a request for confirmation of receipt from the SNMP manager. Notifications can indicate improper user authentication, restarts, the closing of a connection, loss of connection to a neighbor router, or other significant events.
Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/configfun/configuration/guide/ffun_c/fcf014.h tml#wp1007320
Q98. Which two statements about Layer 2 Frame Prioritization bits are true? (Choose two.)
A. 802.1Q frame headers carry the CoS value in the three most-significant bits of the 2-byte Tag Control Information field.
B. ISL frame headers carry an IEEE 802.1P CoS value in the three least-significant bits of the 2-byte User field.
C. ISL frame headers carry an IEEE 802.1P CoS value in the three most-significant bits of the 1-byte User field.
D. On 802.1Q trunks, traffic in the native VLAN is carried in 802.1Q frames.
E. Only 802.1Q and ISL frame types can carry CoS information.
F. On 802.1Q trunks, traffic in the native VLAN is carried in 802.1P frames.
Q99. Where is multicast traffic sent, when it is originated from a spoke site in a DMVPN phase 2 cloud?
B. nowhere, because multicast does not work over DMVPN
C. spoke-spoke and spoke-hub
Spokes map multicasts to the static NBMA IP address of the hub, but hub maps multicast packets to the “dynamic” mappings – that is, the hub replicates multicast packets to all spokes registered via NHRP, so multicast traffic is sent to the hub from a spoke instead of to the other spokes directly.
Q100. Which EIGRP packet types are sent as unicast packets?
A. hello, update, query
B. query, SIA query, reply
C. SIA query, reply, ACK
D. query, SIA query, SIA reply