Testking offers free demo for ccie 400 101 dumps exam. "CCIE Routing and Switching (v5.0)", also known as passleader 400 101 exam, is a Cisco Certification. This set of posts, Passing the Cisco 400 101 ccie exam, will help you answer those questions. The 400 101 dumps Questions & Answers covers all the knowledge points of the real exam. 100% real Cisco passleader 400 101 exams and revised by experts!
Q361. Refer to the exhibit.
If a connection failure occurs between R1 and R2, which two actions can you take to allow CR-1 to reach the subnet 192.168.192.0/24 on R2? (Choose two.)
A. Create a static route on R1 for subnet 192.168.192.0/24 towards R3 and redistribute it into OSPF.
B. Turn up a BGP session between CR-1 and R1.
C. Create a static route on R1 for subnet 192.168.192.0/24 towards R3 and redistribute it into BGP.
D. Turn up an EIGRP session between R1 and R3 with AS 65535.
E. Create an OSPF virtual link between CR-1 and R2 to bypass R1.
Q362. What is the most common use for route tagging in EIGRP?
A. to determine the route source for management purposes
B. to change the metric of a prefix
C. to filter routes in order to prevent routing loops
D. to modify path selection for certain classes of traffic
Q363. Refer to the exhibit.
Which OSPFv3 routes will be visible in the routing table of R2?
B. 2001:12::1/128, 2001:112::1/128
D. No OSPFv3 routes will be visible.
The command “ipv6 unicast-routing” needs to be configured on both routers before any IPv6 routes will be seen.
Q364. Which neighbor-discovery message type is used to verify connectivity to a neighbor when the link-layer address of the neighbor is known?
A. neighbor solicitation
B. neighbor advertisement
C. router advertisement
D. router solicitation
IPv6 Neighbor Solicitation Message A value of 135 in the Type field of the ICMP packet header identifies a neighbor solicitation message. Neighbor solicitation messages are sent on the local link when a node wants to determine the link-layer address of another node on the same local link (see the figure below). When a node wants to determine the link-layer address of another node, the source address in a neighbor solicitation message is the IPv6 address of the node sending the neighbor solicitation message. The destination address in the neighbor solicitation message is the solicited-node multicast address that corresponds to the IPv6 address of the destination node. The neighbor solicitation message also includes the link-layer address of the source node.
Figure 1. IPv6 Neighbor Discovery: Neighbor Solicitation Message
Q365. Refer to the exhibit.
Why is the router out of memory?
A. The router is experiencing a BGP memory leak software defect.
B. The BGP peers have been up for too long.
C. The amount of BGP update traffic in the network is too high.
D. The router has insufficient memory due to the size of the BGP database.
Here we can see that this router is running out of memory due to the large size of the BGP routing database. In this case, this router is receiving over 200,000 routes from each of the 4 peers.
Q366. Which two 802.1D port states are expected in a stable Layer 2 network? (Choose two.)
Q367. Consider a network that mixes link bandwidths from 128 kb/s to 40 Gb/s. Which value should be set for the OSPF reference bandwidth?
A. Set a value of 128.
B. Set a value of 40000.
C. Set a manual OSPF cost on each interface.
D. Use the default value.
E. Set a value of 40000000.
F. Set a value of 65535.
Unlike the metric in RIP which is determined by hop count and EIGRP’s crazy mathematical formulated metric, OSPF is a little more simple. The default formula to calculate the cost for the OSPF metric is (10^8/BW). By default the metrics reference cost is 100Mbps, so any link that is 100Mbps will have a metric of 1. a T1 interface will have a metric of 64 so in this case if a router is trying to get to a FastEthernet network on a router that is through a T1 the metric would be 65 (64 +1). You do however have the ability to statically specify a metric on a per interface basis by using the ip ospf cost # where the cost is an integer between 1-65535.
So the big question is why would you want to statically configure a metric? The biggest advantage of statically configuring an OSPF metric on an interface is to manipulate which route will be chosen dynamically via OSPF. In a nut shell it’s like statically configuring a dynamic protocol to use a specific route. It should also be used when the interface bandwidths vary greatly (some very low bandwidth interfaces and some very high speed interfaces on the same router).
Q368. Which two statements about NetFlow are true? (Choose two.)
A. It must be configured on each router in a network.
B. It supports ATM LAN emulation.
C. The existing network is unaware that NetFlow is running.
D. It uses SIP to establish sessions between neighbors.
E. It provides resource utilization accounting.
NetFlow identifies packet flows for both ingress and egress IP packets. It does not involve any connection-setup protocol, either between routers or to any other networking device or end station. NetFlow does not require any change externally--either to the packets themselves or to any networking device. NetFlow is completely transparent to the existing network, including end stations and application software and network devices like LAN switches. Also, NetFlow capture and export are performed independently on each internetworking device; NetFlow need not be operational on each router in the network. NetFlow data provides fine-grained metering for highly flexible and detailed resource utilization accounting. For example, flow data includes details such as IP addresses, packet and byte counts, timestamps, type-of-service, and application ports. Service providers might utilize the information for billing based on time-of-day, bandwidth usage, application usage, or quality of service. Enterprise customers might utilize the information for departmental chargeback or cost allocation for resource utilization.
Q369. Which technology can be used to prevent flooding of IPv6 multicast traffic on a switch?
A. IGMP snooping
B. IGMP filtering
C. MLD snooping
D. MLD filtering
MLD snooping allows the switch to examine MLD packets and make forwarding decisions based on their content. You can configure the switch to use MLD snooping in subnets that receive MLD queries from either MLD or the MLD snooping querier. MLD snooping constrains IPv6 multicast traffic at Layer 2 by configuring Layer 2 LAN ports dynamically to forward IPv6 multicast traffic only to those ports that want to receive it.
Q370. Which two methods can you use to limit the range for EIGRP queries? (Choose two.)
A. Use an access list to deny the multicast address 126.96.36.199 outbound from select EIGRP neighbor and permit everything else.
B. Configure route tagging for all EIGRP routes.
C. Summarize routes at the boundary routers of the EIGRP domain.
D. Configure unicast EIGRP on all routers in the EIGRP domain.
E. Configure stub routers in the EIGRP domain.
F. Use an access list to deny the multicast address 188.8.131.52 outbound from select EIGRP neighbors and permit everything else.