Master the 400 101 dumps CCIE Routing and Switching (v5.0) content and be ready for exam day success quickly with this Ucertify passleader 400 101 sample question. We guarantee it!We make it a reality and give you real 400 101 ccie questions in our Cisco passleader 400 101 braindumps.Latest 100% VALID Cisco passleader 400 101 Exam Questions Dumps at below page. You can use our Cisco 400 101 ccie braindumps and pass your exam.
Q221. Refer to the exhibit.
Router 1 and Router 2 use HSRP to provide first hop redundancy for hosts on the 10.1.2.0/24 network.
Which feature can provide additional failover coverage for the PC?
A. Cisco Express Forwarding
D. Enhanced Object Tracking
HSRP has a mechanism for tracking the interface line-protocol state. The enhanced object tracking feature separates the tracking mechanism from HSRP. It creates a separate, standalone tracking process that can be used by processes other than HSRP. This feature allows tracking of other objects in addition to the interface line-protocol state. A client process, such as HSRP, can register an interest in tracking objects and request notification when the tracked object changes state. Several clients can track the same object, and can take different actions when the object changes state. This feature increases the availability and speed of recovery of a router system and decreases outages and outage duration.
Q222. DRAG DROP
Drag and drop the protocol on the left to the corresponding administrative distance on the right.
Q223. Which technology can MSDP SA filters use to filter traffic?
A. route maps
B. community lists
C. prefix lists
D. class maps
Q224. For which feature is the address family "rtfilter" used?
A. Enhanced Route Refresh
B. MPLS VPN filtering
C. Route Target Constraint
D. Unified MPLS
With Multiprotocol Label Switching (MPLS) VPN, the internal Border Gateway Protocol (iBGP) peer or Route Reflector (RR) sends all VPN4 and/or VPN6 prefixes to the PE routers. The PE router drops the VPN4/6 prefixes for which there is no importing VPN routing and forwarding (VRF). This is a behavior where the RR sends VPN4/6 prefixes to the PE router, which it does not need. This is a waste of processing power on the RR and the PE and a waste of bandwidth. With Route Target Constraint (RTC), the RR sends only wanted VPN4/6 prefixes to the PE. 'Wanted' means that the PE has VRF importing the specific prefixes. RFC 4684 specifies Route Target Constraint (RTC). The support is through a new address family rtfilter for both VPNv4 and VPNv6.
Q225. Which two technologies are supported by EIGRP? (Choose two.)
A. clear-text authentication
B. MD5 authentication
C. stub routing
D. multiple areas
The IP Enhanced IGRP Route Authentication feature provides MD5 authentication of routing updates from the EIGRP routing protocol. The MD5 keyed digest in each EIGRP packet prevents the introduction of unauthorized or false routing messages from unapproved sources. The EIGRP stub routing feature improves network stability, reduces resource utilization, and simplifies the stub device configuration. Stub routing is commonly used in hub-and-spoke network topologies. In a hub-and-spoke network, one or more end (stub) networks are connected to a remote device (the spoke) that is connected to one or more distribution devices (the hub). The remote device is adjacent to one or more distribution devices. The only route for IP traffic to reach the remote device is through a distribution device.
References: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_eigrp/configuration/15-s/ire-15-s-book/ire-rte-auth.html http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_eigrp/configuration/15-s/ire-15-s-book/ire-eigrp-stub-rtg.html
Q226. Which two statements about EIGRP load balancing are true? (Choose two.)
A. EIGRP supports 6 unequal-cost paths.
B. A path can be used for load balancing only if it is a feasible successor.
C. EIGRP supports unequal-cost paths by default.
D. Any path in the EIGRP topology table can be used for unequal-cost load balancing.
E. Cisco Express Forwarding is required to load-balance across interfaces.
Q227. Refer to the exhibit.
Which statement about authentication on Router A is true?
A. The router will attempt to authenticate users against TACACS+ only.
B. The router will attempt to authenticate users against the local database only.
C. The router will attempt to authenticate users against the local database first, and fall back to TACACS+ if the local database authentication fails.
D. The router will authenticate users against the default database only.
E. The router will attempt to authenticate users against TACACS+ first, and fall back to the local database if the TACACS+ authentication fails.
Q228. Refer to the exhibit.
Which option is the result of this configuration?
A. Devices in OSPF area 15 can reach the summary route 192.168.0.0/16 and its more specific subnets.
B. Devices in OSPF area 15 can reach only the more specific routes of 192.168.0.0/16.
C. Devices in OSPF area 0 can reach the summary route 192.168.0.0/16 and its more specific subnets.
D. Devices in OSPF area 0 can reach only the summary route of 192.168.0.0/16.
. area range
To consolidate and summarize routes at an area boundary, use the area range command in router configuration mode. To disable this function, use theno form of this command. Area area-id range ip-address mask [advertise | not-advertise] [cost cost] no area area-id range ip-address mask [advertise | not-advertise] [cost cost]
. Syntax Description
Identifier of the area about which routes are to be summarized. It can be specified as either a decimal value or as an IP address.
IP address mask.
(Optional) Sets the address range status to advertise and generates a Type 3 summary link-state advertisement (LSA).
(Optional) Sets the address range status to DoNotAdvertise. The Type 3 summary LSA is suppressed, and the component networks remain hidden from other networks.
Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/iproute/command/reference/fiprrp_r/1rfospf. html
Q229. Which two statements about MAC Authentication Bypass are true? (Choose two.)
A. Traffic from an endpoint is authorized to pass after MAB authenticates the MAC address of the endpoint.
B. During the learning stage, the switch examines multiple packets from the endpoint to determine the MAC address of the endpoint.
C. After the switch learns the MAC address of the endpoint, it uses TACACS+ to authenticate it.
D. After learning a source MAC address, it sends the host a RADIUS Account-Request message to validate the address.
E. The MAC address of a device serves as its user name and password to authenticate with a RADIUS server.
Q230. Refer to the exhibit.
While troubleshooting high CPU utilization of a Cisco Catalyst 4500 Series Switch, you notice the error message that is shown in the exhibit in the log file.
What can be the cause of this issue, and how can it be prevented?
A. The hardware routing table is full. Redistribute from BGP into IGP.
B. The software routing table is full. Redistribute from BGP into IGP.
C. The hardware routing table is full. Reduce the number of routes in the routing table.
D. The software routing table is full. Reduce the number of routes in the routing table.
Error MessageC4K_L3HWFORWARDING-2-FWDCAMFULL:L3 routing table is full.
Switching to software forwarding.
The hardware routing table is full; forwarding takes place in the software instead. The switch performance might be degraded.
Recommended Action: Reduce the size of the routing table. Enter the ip cef command to return to hardware forwarding.