Get actual & Latest 400-101 Questions, Plus Accurate Answers
Exam Code: 400-101
Exam Name: CCIE Routing and Switching (v5.0)
Actual 400-101 faq Reviews & Tips
Cause all that matters here is passing the Cisco 400-101 exam. Cause all that you need is a high score of 400-101 CCIE Routing and Switching (v5.0) exam. The only one thing you need to do is downloading Examcollection 400-101 exam study guides now. We will not let you down with our money-back guarantee.
2017 Apr 400-101 braindumps
Q1. Which three modes are valid PfR monitoring modes of operation? (Choose three.)
A. route monitor mode (based on BGP route changes)
B. RMON mode (based on RMONv1 and RMONv2 data)
C. passive mode (based on NetFlow data)
D. active mode (based on Cisco IP SLA probes)
E. fast mode (based on Cisco IP SLA probes)
F. passive mode (based on Cisco IP SLA probes)
Mode monitor passive
Passive monitoring is the act of PfR gathering information on user packets assembled into flows by Netflow. Passive monitoring is typically only recommended in Internet edge deployments because active probing is ineffective because of security policies that block probing. PfR, when enabled, automatically enables Netflow on the managed interfaces on the Border Routers. By aggregating this information on the Border Routers and periodically reporting the collected data to the Master Controller, the network prefixes and applications in use can automatically be learned.
Mode monitor active
Active monitoring is the act of generating Cisco IOS IP Service Level Agreements (SLAs) probes to generate test traffic for the purpose of obtaining information regarding the characteristics of the WAN links. PfR can either implicitly generates active probes when passive monitoring has identified destination hosts, or the network manager can explicitly configured probes in the PfR configuration. When jitter probes are used (common use case), Target Discovery is used to learn the respond address and to automatically generate the probes.
Mode monitor Fast
This mode generates active probes through all exists continuously at the configured probe frequency. This differs from either active or both modes in that these modes only generate probes through alternate paths (exits) in the event the current path is out-of-policy.
Q2. Refer to the exhibit.
NHRP registration is failing; what might be the problem?
A. invalid IP addressing
C. incorrect NHRP mapping
D. incorrect NHRP authentication
Configuring an authentication string ensures that only routers configured with the same string can communicate using NHRP. Therefore, if the authentication scheme is to be used, the same string must be configured in all devices configured for NHRP on a fabric
Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_4/ip_addr/configuration/guide/hadnhrp.html#w p1055432
Q3. DRAG DROP
Drag and drop the RIP configuration command on the left to the function it performs on the right.
Q4. Which three statements about the differences between Cisco IOS and IOS-XE functionality are true? (Choose three.)
A. Only IOS-XE Software can host applications outside of the IOS context.
B. Only the IOS-XE Services Plane has multiple cores.
C. Only the IOS-XE Data Plane has multiple cores.
D. Only the IOS-XE Control Plane has multiple cores.
E. Only IOS-XE module management integrates with packet processing.
F. Only IOS-XE configuration and control is integrated with the kernel.
Q5. On a network using RIPng, the prefix field of a routing table entry has a value of 0:0:0:0:0:0:0:0. What does this value signify?
A. The next hop address is unknown.
B. The next hop address is a site-local address.
C. The neighboring router has IPv6 ND disabled.
D. The next hop address must be the originator of the route advertisement.
E. The associated route follows a default route out of the network.
Renew 400-101 practice question:
Q6. On which three options can Cisco PfR base its traffic routing? (Choose three.)
A. Time of day
B. An access list with permit or deny statements
C. Load-balancing requirements
D. Network performance
E. User-defined link capacity thresholds
F. Router IOS version
Key Advantages of using PfR for Load balancing:
. Utilization based load-balancing: PfR takes real-time link utilization into account when load balancing the links. This will ensure that a link will not go beyond a certain percentage of its maximum capacity (75% by default).
. Application Performance based Load Balancing: PfR does not randomly forward traffic through one link or another. It takes application performance requirements into consideration and then forwards the traffic through a link which meets the performance policy requirements. PfR also load balances the link at the same time.
. Bi-directional Solution: PfR is a bi-directional load balancing solution which influences outbound as well as in-bound traffic.
. Consolidated Centralized View: PfR offers consolidated and centralized view of the state of all external links in the network. At any given time, the network administrator can see the current link utilization (in kbps and percentage of its capacity), maximum link threshold, and the policies applied to the links in the network.
Q7. Which three values can be used to tag external EIGRP routes? (Choose three.)
A. The router ID of the router that redistributed the route
B. The administrative distance of the external protocol
C. The protocol ID of the external protocol
D. The cost to reach the router that redistributed the route
E. The metric from the external protocol F. The router ID of the router from which the external protocol route was learned
EIGRP has the notion of internal and external routes. Internal routes are ones that have been originated within an EIGRP autonomous system (AS). Therefore, a directly attached network that is configured to run EIGRP is considered an internal route and is propagated with this information throughout the EIGRP AS. External routes are ones that have been learned by another routing protocol or reside in the routing table as static routes. These routes are tagged individually with the identity of their origination. External routes are tagged with the following information:
The router ID of the EIGRP router that redistributed the route.
The AS number where the destination resides.
A configurable administrator tag.
Protocol ID of the external protocol.
The metric from the external protocol.
Bit flags for default routing.
Q8. Refer to the exhibit.
Which action must you take to enable full reachability from router C to router D?
A. Build an OSPF virtual link.
B. Build an OSPF sham link.
C. Configure mutual redistribution between OSPF and EIGRP on routers A and B.
D. Add a static route on router D.
For full connectivity, we need to configure mutual redistribution to advertise the EIGRP routes into OSPF and to advertise the OSPF routes into the EIGRP network. This needs to be done at the two border routers that connect to both the EIGRP and OSPF domains.
Q9. Which statement is true about VPLS?
A. MPLS is not required for VPLS to work.
B. VPLS carries packets as Layer 3 multicast.
C. VPLS has been introduced to address some shortcomings of OTV.
D. VPLS requires an MPLS network.
VPLS uses MPLS labels so an MPLS network is required. VPLS MPLS packets have a two-label stack. The outer label is used for normal MPLS forwarding in the service provider's network. If BGP is used to establish the VPLS, the inner label is allocated by a PE as part of a label block. If LDP is used, the inner label is a virtual circuit ID assigned by LDP when it first established a mesh between the participating PEs. Every PE keeps track of assigned inner label, and associates these with the VPLS instance.
Q10. Refer to the exhibit.
How can Router X in AS70000 peer with Router Y in AS65000, in case Router Y supports only 2-byte ASNs?
A. Router X should be configured with a remove-private-as command, because this will establish the peering session with a random private 2-byte ASN.
B. It is not possible. Router Y must be upgraded to an image that supports 4-byte ASN.
C. Router Y should be configured with a 4-byte AS using the local-as command.
D. Router X should be configured with a 2-byte AS using the local-as command.
Since router Y does not support 4-byte ASN,s it will not understand any AS numbers larger than 65535, so router X should use the local-as command on the peering statement to router Y to so that it sends in a 2-byte ASN to router Y.
Get More Information : Get 400-101 now
Money Back Guarantee
CertifyForAll has a remarkable Candidate Success record. We're confident of our products and provide a no hassle money back guarantee.
Who Chooses CertifyForAll
CertifyForAll is the world's largest certification preparation company with 99.3% Pass Rate History from 170344+ Satisfied Customers in 145 Countries.