Our pass rate is high to 98.9% and the similarity percentage between our 400 101 vce study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Cisco 400 101 pdf exam in just one try? I am currently studying for the Cisco 400 101 dumps exam. Latest Cisco cisco 400 101 Test exam practice questions and answers, Try Cisco cisco 400 101 Brain Dumps First.
Q21. How many hash buckets does Cisco Express Forwarding use for load balancing?
In order to understand how the load balance takes place, you must first see how the tables relate. The Cisco Express Forwarding table points to 16 hash buckets (load share table), which point to the adjacency table for parallel paths. Each packet to be switched is broken up into the source and destination address pair and checked against the loadshare table.
Q22. Which type of port would have root guard enabled on it?
A. A root port
B. An alternate port
C. A blocked port
D. A designated port
The root guard feature provides a way to enforce the root bridge placement in the network. The root guard ensures that the port on which root guard is enabled is the designated port. Normally, root bridge ports are all designated ports, unless two or more ports of the root bridge are connected together. If the bridge receives superior STP Bridge Protocol Data Units (BPDUs) on a root guard-enabled port, root guard moves this port to a root-inconsistent STP state. This root-inconsistent state is effectively equal to a listening state. No traffic is forwarded across this port. In this way, the root guard enforces the position of the root bridge.
Q23. In which two situations is an EIGRP hello packet sent as unicast? (Choose two.)
A. during neighbor discovery
B. when link costs change
C. when the neighbor command is used
D. when an ACK is sent
Q24. Which statement about NAT64 is true?
A. NAT64 provides address family translation and translates IPv4 to IPv6 and IPv6 to IPv4.
B. NAT64 provides address family translation and can translate only IPv6 to IPv4.
C. NAT64 should be considered as a permanent solution.
D. NAT64 requires the use of DNS64.
Q25. Which statement about OTV is true?
A. The overlay interface becomes active only when configuration is complete and it is manually enabled.
B. OTV data groups can operate only in PIM sparse-mode.
C. The overlay interface becomes active immediately when it is configured.
D. The interface facing the OTV groups must be configured with the highest MTU possible.
OTV has the following configuration guidelines and limitations:
. If the same device serves as the default gateway in a VLAN interface and the OTV edge device for the VLANs being extended, configure OTV on a device (VDC or switch) that is separate from the VLAN interfaces (SVIs).
. When possible, we recommend that you use a separate nondefault VDC for OTV to allow for better manageability and maintenance.
. An overlay interface will only be in an up state if the overlay interface configuration is complete and enabled (no shutdown). The join interface has to be in an up state.
Q26. A floating static route appears in the routing table of an interface even when the interface is unusable.
Which action can you take to correct the problem?
A. Remove the permanent option from the static route.
B. Correct the administrative distance.
C. Configure the floating static route to point to another route in the routing table.
D. Correct the DHCP-provided route on the DHCP server.
Q27. Which service is disabled by the no service tcp-small-servers command?
A. the finger service
B. the Telnet service
C. the Maintenance Operation Protocol service
D. the chargen service
The TCP small servers are: . Echo: Echoes back whatever you type through the telnet x.x.x.x echo command.
. Chargen: Generates a stream of ASCII data. Use the telnet x.x.x.x chargen Command.
. DiscarD. Throws away whatever you type. Use the telnet x.x.x.x discard command.
. DaytimE. Returns system date and time, if it is correct. It is correct if you run Network Time Protocol (NTP), or have set the date and time manually from the exec level. Use the telnet x.x.x.x daytime command.
Q28. Refer to the exhibit.
Which command can you enter to resolve this error message on a peer router?
A. username <username> password <password>
B. ppp chap <hostname>
C. aaa authorization exec if-authenticated
D. aaa authorization network if-authenticated
Q29. Which two hashing algorithms can be used when configuring SNMPv3? (Choose two.)
Note that SNMPv3 does not send passwords in clear-text and uses hash-based authentication with either MD5 or SHA1 functions (HMAC authentication – the packet conted is hashed along with authentication key to produce the authentication string).
Q30. Which two statements about the default behavior of IS-IS are true? (Choose two.)
A. The default IS-IS router type is L1/L2.
B. The default IS-IS metric type is wide.
C. The default IS-IS interface circuit type is L1/L2.
D. By default, two IS-IS routers must use the same hello interval and hold timer in order to become neighbors.