Testking 400-101 Instruction maintains its actually novelty as you get a lot more than only the technique encounter, alternatively within the worldwide field youll have possible opportunity to use it lots of methods. Cisco 400-101 responses coming from Testking keep your common schools education needs. It is not necessary in order to search regarding Cisco Qualifications 400-101 Braindumps also. Break free from appointed education timings as well as move within the new era for Testking 400-101 as well as 400-101 Train Examinations at the individual speed.

2017 Apr 400-101 exam topics

Q51. Which two methods change the IP MTU value for an interface? (Choose two.) 

A. Configure the default MTU. 

B. Configure the IP system MTU. 

C. Configure the interface MTU. 

D. Configure the interface IP MTU. 

Answer: C,D 

Explanation: 

An IOS device configured for IP+MPLS routing uses three different Maximum Transmission Unit (MTU) values: The hardware MTU configured with the mtu interface configuration command 

. The IP MTU configured with the ip mtu interface configuration command 

. The MPLS MTU configured with the mpls mtu interface configuration command 

The hardware MTU specifies the maximum packet length the interface can support … or at least that's the theory behind it. In reality, longer packets can be sent (assuming the hardware interface chipset doesn't complain); therefore you can configure MPLS MTU to be larger than the interface MTU and still have a working network. Oversized packets might not be received correctly if the interface uses fixed-length buffers; platforms with scatter/gather architecture (also called particle buffers) usually survive incoming oversized packets. 

IP MTU is used to determine whether am IP packet forwarded through an interface has to be fragmented. It has to be lower or equal to hardware MTU (and this limitation is enforced). If it equals the HW MTU, its value does not appear in the running configuration and it tracks the changes in HW MTU. For example, if you configure ip mtu 1300 on a Serial interface, it will appear in the running configuration as long as the hardware MTU is not equal to 1300 (and will not change as the HW MTU changes). However, as soon as the mtu 1300 is configured, the ip mtu 1300 command disappears from the configuration and the IP MTU yet again tracks the HW MTU. 

Reference: http://blog.ipspace.net/2007/10/tale-of-three-mtus.html 


Q52. Which two options are the two underlying protocols on which a DMVPN relies? (Choose two.) 

A. IPsec 

B. NHRP 

C. GDOI 

D. ISAKMP 

E. SSL 

F. NLRI 

Answer: A,B 


Q53. Which two features are supported when Cisco HDLC is implemented? (Choose two.) 

A. error recovery 

B. error detection 

C. asynchronous links 

D. multiple protocols 

Answer: B,D 

Explanation: 

HDLC’s frame check sequence (FCS) is a 16-bit CRC-CCITT or a 32-bit CRC-32 computed over the Address, Control, and Information fields. It provides a means by which the receiver can detect errors that may have been induced during the transmission of the frame, such as lost bits, flipped bits, and extraneous bits. Cisco’s HDLC contains a proprietary field that is used to support multiple protocols. 

Reference: http://en.wikipedia.org/wiki/High-Level_Data_Link_Control 


Q54. Refer to the exhibit. 

R1 is performing mutual redistribution, but OSPF routes from R3 are unable to reach R2. Which three options are possible reasons for this behavior? (Choose three.) 

A. R1 requires a seed metric to redistribute RIP. 

B. The RIP version supports only classful subnet masks. 

C. R1 is filtering OSPF routes when redistributing into RIP. 

D. R3 and R1 have the same router ID. 

E. R1 and R3 have an MTU mismatch. 

F. R2 is configured to offset OSPF routes with a metric of 16. 

Answer: A,C,F 

Explanation: 

A. RIP requires a seed metric to be specified when redistributing routes into that protocol. A seed metric is a "starter metric" that gives the RIP process a metric it can work with. The OSPF metric of cost is incomprehensible to RIP, since RIP's sole metric is hop count. We've got to give RIP a metric it understands when redistributing routes into that protocol, so let's go back to R1 and do so. 

C. Filtering routes is another explanation, if the routes to R2 are boing filtered from being advertised to R1. 

F. If the metric is offset to 16, then the routes will have reached the maximum hop count when redistributed to RIP. The max hop count for RIP is 16. 


Q55. Which option describes the purpose of the PPP endpoint discriminator? 

A. It identifies the maximum payload packet. 

B. It notifies the peer that it prefers 12-bit sequence numbers. 

C. It identifies the system attached to the link. 

D. It determines whether a loopback is on the link. 

Answer:

Explanation: 

In situations in which many clients use the same username to initiate an MP connection, or when interoperating with non-Cisco routers, you need to control the order in which the bundle name is created. It is necessary to configure the access server to create a bundle name based on the endpoint discriminator first, the username second, or both. The endpoint discriminator identifies the system transmitting the packet and advises the network access server (NAS) that the peer on this link could be the same as the peer on another existing link. Because every client has a unique endpoint discriminator, only multiple links from the same client are bundled into a single unique MP connection. For example, consider when two PC clients initiate a multilink connection to an access server using the same username. If the multilink bundle name is established based on the endpoint discriminator first, then on the username or on both, the NAS can accurately bundle the links from each client using the endpoint discriminator as a bundle name. This bundle name is unique to the peer system transmitting the packet. 

Reference: http://www.cisco.com/c/en/us/support/docs/wan/point-to-point-protocol-ppp/10238-mppp-bundle-name.html 


Up to date 400-101 practice exam:

Q56. Which three benefits does the Cisco Easy Virtual Network provide to an enterprise network? 

(Choose three.) 

A. simplified Layer 3 network virtualization 

B. improved shared services support 

C. enhanced management, troubleshooting, and usability 

D. reduced configuration and deployment time for dot1q trunking 

E. increased network performance and throughput 

F. decreased BGP neighbor configurations 

Answer: A,B,C 


Q57. In which two modes do IPv6-in-IPv4 tunnels operate? (Choose two.) 

A. tunnel mode 

B. transport mode 

C. 6to4 mode 

D. 4to6 mode 

E. ISATAP mode 

Answer: C,E 

Explanation: 

*There are 5 tunneling solution in IPv6:* 

*1. Using the “Tunnel mode ipv6ip”, in this case the tunnel source and destination are configured with IPv4 addressing and the tunnel interface is configured with IPv6. This will use protocol 41. This is used for IPv6/IPv4. 

R1(config)#int tunnel 1 

R1(config-if)#ipv6 address 12:1:12::1/64 

R1(config-if)#tunnel source 10.1.12.1 

R1(config-if)#tunnel destination 10.1.12.2 

R1(config-if)#*tunnel mode ipv6ip* 

*

2. Using the “Tunnel mode gre ipv6, in this case the tunnel source and destination are all configured with IPv6 addressing. This is used for IPv6/IPv6. 

BB1(config)#int tunnel 1 

BB1(config-if)#ipv6 address 121:1:121::111/64 

BB1(config-if)#tunnel source 10:1:111::111 

BB1(config-if)#tunnel destination 10:1:112::112 

BB1(config-if)#*tunnel mode gre ipv6* 

*3. 

In this case, the third type, the tunnel mode is NOT used at all, note that the tunnel interface is configured with IPv6 and the tunnel source and destination is configured with IPv4 but no mention of tunnel mode. This configuration will use protocol 47. This is used for IPv6/IPv4. 

R1(config)#int tunnel 13 

R1(config-if)#ipv6 address 13:1:13::1/64 

R1(config-if)#tunnel source 10.1.13.1 

R1(config-if)#tunnel destination 10.1.13.3 

*4. Note in this case a special addressing is assigned to the tunnel interface which is a concatenation of a reserved IPv6 address of 2002followed by the translated IPv4 address of a given interface on the router. In this configuration ONLY the tunnel source address is used and since the tunnel is automatic, the destination address is NOT configured. The tunnel mode is set to “Tunnel mode ipv6ip 6to4. Note the IPv4 address of 10.1.1.1 is translated to 0A.01.01.01 and once concatenated, it will be “2002:0A01:0101: or 2002:A01:101. This is used for IPv6/IPv4. 

R1(config)#interface Tunnel14 

R1(config-if)#ipv6 address 2002:A01:101::/128 

R1(config-if)#tunnel source 10.1.1.1 

R1(config-if)#*tunnel mode ipv6ip 6to4* 

*5. ISATAP, ISATAP works like 6to4 tunnels, with one major difference, it uses a special IPv6 address which is formed as follows: * 

*In this tunnel mode, the network portion can be any IPv6 address, whereas in 6to4 it had to start with 2002.* 

*Note when the IPv6 address is assigned to the tunnel interface, the “eui-64 is used, in this case the host portion of the IPv6 address starts with “0000.5EFE” and then the rest of the host portion is the translated IPv4 address of the tunnel’s source IPv4 address. This translation is performed automatically unlike 6to4. This is used for IPv6/IPv4.* 

R4(config)#int tunnel 46 

R4(config-if)#ipv6 address 46:1:46::/64 eui-64 

R4(config-if)#tunnel source 10.44.44.44 

R4(config-if)#*tunnel mode ipv6ip ISATAP* 


Q58. Refer to the exhibit. 

Which two statements about this capture are true? (Choose two.) 

A. It is set to run for five minutes. 

B. It continues to capture data after the buffer is full. 

C. It is set to run for a period of 00:03:26. 

D. It captures data only until the buffer is full. 

E. It is set to use the default buffer type. 

Answer: A,B 


Q59. DRAG DROP 

Drag and drop the IGMPv2 timer on the left to its default value on the right. 

Answer: 


Q60. DRAG DROP 

Drag each spanning-tree feature on the left to the matching statement on the right. 

Answer: