Act now and download your Cisco ccie 400 101 dumps test today! Do not waste time for the worthless Cisco 400 101 ccie tutorials. Download Avant-garde Cisco CCIE Routing and Switching (v5.0) exam with real questions and answers and begin to learn Cisco 400 101 pdf with a classic professional.

Q31. When you implement PfR, which IP SLA probe is used to determine the MOS? 

A. jitter 

B. latency 

C. packet loss 

D. throughput 


Q32. Refer to the exhibit. 

AS #1 and AS #2 have multiple EBGP connections with each other. AS #1 wants all return traffic that is destined to the prefix to enter through the router R1 from AS #2. 

In order to achieve this routing policy, the AS 1 advertises a lower MED from R1, compared to a higher MED from R3, to their respective BGP neighbor for the prefix Will this measure guarantee that the routing policy is always in effect? 

A. Yes, because MED plays a deterministic role in return traffic engineering in BGP. 

B. Yes, because a lower MED forces BGP best-path route selection in AS #2 to choose R1 as the best path for 

C. Yes, because a lower MED in AS #2 is the highest BGP attribute in BGP best-path route selection. 

D. No, AS #2 can choose to alter the weight attribute in R2 for BGP neighbor R1, and this weight value is cascaded across AS #2 for BGP best-path route selection. 

E. No, AS #2 can choose to alter the local preference attribute to overwrite the best-path route selection over the lower MED advertisement from AS #1. This local preference attribute is cascaded across AS #2 for the BGP best-path route selection. 



MED and AS path prepending can both be used to influence the way incoming traffic from other Autonomous Systems get sent to the local AS, but they provide no guarantee as the other AS ultimately has the final word in how they send traffic. Since local preference is preferred over MED in the BGP decision process, the other AS can configure local preference to override the MED settings you have configured. 

Q33. Refer to the exhibit. 

Which statement about this IP SLA is true? 

A. The SLA must also have a schedule configured before it will start. 

B. The TTL of the SLA packets is 10. 

C. The SLA has a timeout of 3.6 seconds. 

D. The SLA has a lifetime of 5 seconds. 



When you configure an IP SLAs operation, you must schedule the operation to begin capturing statistics and collecting error information. You can schedule an operation to start immediately or to start at a certain month, day, and hour. You can use the pending option to set the operation to start at a later time. The pending option is an internal state of the operation that is visible through SNMP. The pending state is also used when an operation is a reaction (threshold) operation waiting to be triggered. You can schedule a single IP SLAs operation or a group of operations at one time. We can see in this output that the IP SLA is still in a pending trigger state. 


Q34. Which two OSPF LSA types are flooded within the originating area? (Choose two.) 

A. type 1, Router LSA 

B. type 2, Network LSA 

C. type 3, Network Summary LSA 

D. type 4, ASBR Summary LSA 

E. type 6, Group Membership LSA 

F. type 9, Opaque LSA 

Answer: A,B 


OSPF relies on several types of Link State Advertisements (LSAs) to communicate link state information between neighbors. A brief review of the most applicable LSA types: 

. Type 1 - Represents a router 

. Type 2 - Represents the pseudonode (designated router) for a multiaccess link 

. Type 3 - A network link summary (internal route) 

. Type 4 - Represents an ASBR 

. Type 5 - A route external to the OSPF domain 

. Type 7 - Used in stub areas in place of a type 5 LSA LSA types 1 and 2 are found in all areas, and are never flooded outside of an area. They are only flooded within the area that they originated from. 


Q35. Which two options are mandatory components of a multiprotocol BGP VPN-IPv4 address? (Choose two.) 

A. a route distinguisher 

B. an IPv4 address 

C. a route target 

D. an MPLS label 

E. a system ID 

F. an area ID 

Answer: A,B 


The IP prefix is a member of the IPv4 address family. After the PE device learns the IP prefix, the PE converts it into a VPN-IPv4 prefix by combining it with an 8-byte route distinguisher (RD). The generated prefix is a member of the VPN-IPv4 address family. It uniquely identifies the customer address, even if the customer site is using globally nonunique (unregistered private) IP addresses. The route distinguisher used to generate the VPN-IPv4 prefix is specified by a configuration command associated with the virtual routing and forwarding (VRF) instance on the PE device. 


Q36. Refer to the exhibit. 

Router A and router B are physically connected over an Ethernet interface, and IS-IS is configured as shown. Which option explains why the IS-IS neighborship is not getting formed between router A and router B? 

A. same area ID 

B. same N selector 

C. same domain ID 

D. same system ID 



With IS-IS, the LSP identifier is derived from the system ID (along with the pseudonode ID and LSP number). Each IS is usually configured with one NET and in one area; each system ID within an area must be unique. The big difference between NSAP style addressing and IP style addressing is that, in general, there will be a single NSAP address for the entire router, whereas with IP there will be one IP address per interface. All ISs and ESs in a routing domain must have system IDs of the same length. All routers in an area must have the same area address. All Level 2 routers must have a unique system ID domain-wide, and all Level 1 routers must have a unique system ID area-wide. 

Reference: tml 

Q37. Refer to the exhibit. 

You are configuring the S1 switch for the switch port that connects to the client computer. Which configuration blocks users on the port from using more than 6 Mbps of traffic and marks the traffic for a class of service of 1? 





A. Exhibit A 

B. Exhibit B 

C. Exhibit C 

D. Exhibit D 



Only option A specified that the exceed and violate actions are set to drop for traffic over the CIR of 6 Mbps, and is also configured to set all traffic with a COS of 1 using the “set cos1” command. 

Q38. Which two options are EIGRP route authentication encryption modes? (Choose two.) 

A. MD5 

B. HMAC-SHA-256bit 



Answer: A,B 


Packets exchanged between neighbors must be authenticated to ensure that a device accepts packets only from devices that have the same preshared authentication key. Enhanced Interior Gateway Routing Protocol (EIGRP) authentication is configurable on a per-interface basis; this means that packets exchanged between neighbors connected through an interface are authenticated. EIGRP supports message digest algorithm 5 (MD5) authentication to prevent the introduction of unauthorized information from unapproved sources. MD5 authentication is defined in RFC 1321. EIGRP also supports the Hashed Message Authentication Code-Secure Hash Algorithm-256 (HMAC-SHA-256) authentication method. 


Q39. Which two statements about ERSPAN are true? (Choose two.) 

A. It supports jumbo frames of up to 9202 bytes. 

B. It adds a 50-byte header to copied Layer 2 Ethernet frames. 

C. It supports packet fragmentation and reassembles the packets. 

D. It adds a 4-byte header to copied Layer 2 Ethernet frames. 

E. Source sessions on an individual switch can use different origin IP addresses. 

Answer: A,B 

Q40. Which technology can create a filter for an embedded packet capture? 

A. Control plane policing 

B. Access lists 


D. Traffic shaping 



A filter can be applied to limit the capture to desired traffic. Define an Access Control List (ACL) within config mode and apply the filter to the buffer: 

ip access-list extended BUF-FILTER 

permit ip host host 

permit ip host host 

monitor capture buffer BUF filter access-list BUF-FILTER