Get actual & Latest 400-101 Questions, Plus Accurate Answers
Exam Code: 400-101
Exam Name: CCIE Routing and Switching (v5.0)
400 101 ccie (461 to 470)
we provide Download Cisco passleader 400 101 download which are the best for clearing passleader 400 101 test, and to get certified by Cisco CCIE Routing and Switching (v5.0). The passleader 400 101 Questions & Answers covers all the knowledge points of the real 400 101 pdf exam. Crack your Cisco 400 101 dumps Exam with latest dumps, guaranteed!
Q461. The OSPF database of a router shows LSA types 1, 2, 3 and 7 only. Which type of area is this router connected to?
A. backbone area
B. totally stubby area
C. stub area
D. not-so-stubby area
Q462. Which statement about the feasible distance in EIGRP is true?
A. It is the maximum metric that should feasibly be considered for installation in the RIB.
B. It is the minimum metric to reach the destination as stored in the topology table.
C. It is the metric that is supplied by the best next hop toward the destination.
D. It is the maximum metric possible based on the maximum hop count that is allowed.
An EIGRP router advertises each destination it can reach as a route with an attached metric. This metric is called the route's reported distance (the term advertised distance has also been used in older documentation). A successor route for any given destination is chosen as having the lowest computed feasible distance; that is, the lowest sum of reported distance plus the cost to get to the advertising router. By default, an EIGRP router will store only the route with the best (lowest) feasible distance in the routing table (or, multiple routes with equivalent feasible distances).
Q463. Refer to the exhibit.
Which two pieces of information in this Wireshark capture indicate that you are viewing EIGRP traffic? (Choose two.)
A. the header length
B. the protocol number
C. the destination address
D. the Class Selector
E. the source address
F. the header checksum
EIGRP uses protocol number 88, which shows as EIGRP in the capture. Also, we in the capture that the destination IP address is 126.96.36.199, which is the Enhanced Interior Gateway Routing Protocol (EIGRP) group address is used to send routing information to all EIGRP routers on a network segment.
Q464. Which statement describes the difference between a stub area and a totally stub area?
A. The ABR advertises a default route to a totally stub area and not to a stub area.
B. Stub areas do not allow LSA types 4 and 5, while totally stub areas do not allow LSA types 3, 4, and 5.
C. Totally stub areas allow limited external routes in the area via a special type 7 LSA, while stub areas do not.
D. Stub areas do not allow external LSAs, ASBR summary LSAs, or summary LSAs with the exception of a default route originated by the ABR via a summary LSA.
. Standard areas can contain LSAs of type 1, 2, 3, 4, and 5, and may contain an ASBR. The backbone is considered a standard area.
. Stub areas can contain type 1, 2, and 3 LSAs. A default route is substituted for external routes.
. Totally stubby areas can only contain type 1 and 2 LSAs, and a single type 3 LSA. The type 3 LSA describes a default route, substituted for all external and inter-area routes.
. Not-so-stubby areas implement stub or totally stubby functionality yet contain an ASBR. Type 7 LSAs generated by the ASBR are converted to type 5 by ABRs to be flooded to the rest of the OSPF domain.
Q465. You are configuring Wireshark on a Cisco Catalyst 4500E Switch with a Supervisor 8. Which three actions can you take to prevent the capture from overloading the CPU? (Choose three.)
A. Attach the specific ports that are part of the data path.
B. Use an in-line filter.
C. Use an appropriate ACL.
D. Add memory to the Supervisor.
E. Reconfigure the buffers to accommodate the additional traffic.
F. Configure a policy map, class map, and an access list to express the match conditions.
Because packet forwarding typically occurs in hardware, packets are not copied to the CPU for software processing. For Wireshark packet capture, packets are copied and delivered to the CPU, which causes an increase in CPU usage. To avoid high CPU, do the following:
. Attach only relevant ports.
. Use a class map, and secondarily, an access list to express match conditions. If neither is viable, use an explicit, in-line filter.
. Adhere closely to the filter rules. Restrict the traffic type (such as, IPv4 only) with a restrictive, rather than relaxed ACL, which elicits unwanted traffic.
Q466. Which statement is true regarding the UDP checksum?
A. It is used for congestion control.
B. It cannot be all zeros.
C. It is used by some Internet worms to hide their propagation.
D. It is computed based on the IP pseudo-header.
The method used to compute the checksum is defined in RFC 768: “Checksum is the 16-bit one's complement of the one's complement sum of a pseudo header of information from the IP header, the UDP header, and the data, padded with zero octets at the end (if necessary) to make a multiple of two octets.” In other words, all 16-bit words are summed using one's complement arithmetic. Add the 16-bit values up. Each time a carry-out (17th bit) is produced, swing that bit around and add it back into the least significant bit. The sum is then one's complemented to yield the value of the UDP checksum field. If the checksum calculation results in the value zero (all 16 bits 0) it should be sent as the one's complement (all 1s).
Q467. DRAG DROP
Drag and drop the BGP attribute on the left to the correct category on the right.
Q468. DRAG DROP
Drag and drop the EIGRP query condition on the left to the corresponding action taken by the router on the right.
Q469. Which three TLVs does LLDP use to discover network devices? (Choose three.)
A. Management address
B. Port description
C. Network policy
D. System name
E. Location information
F. Power management
Basic Management TLV Set
This set includes the following five TLVs used in LLDP:
. Port description TLV: Provides a description of the port in an alpha-numeric format. The value equals the ifDescr object, if the LAN device supports RFC 2863.
. System name TLV: Provides the system's assigned name in an alpha-numeric format. The value equals the sysName object, if the LAN device supports RFC 3418.
. System description TLV: Provides a description of the network entity in an alpha-numeric format. This includes system's name and versions of hardware, operating system and networking software supported in the device. The value equals the sysDescr object, if the LAN device supports RFC 3418.
. System capabilities TLV: Indicates the primary function(s) of the device and whether or not these functions are enabled in the device. The capabilities are indicated by two octects. Bits 0 through 7 indicate Other, Repeater, Bridge, WLAN AP, Router, Telephone, DOCSIS cable device and Station respectively. Bits 8 through 15 are reserved.
. Management address TLV: Indicates the addresses of the local LLDP agent. Other remote managers can use this address to obtain information related to the local device.
Q470. What is the maximum number of secondary IP addresses that can be configured on a router interface?
F. no limit to the number of addresses
From “IP Routing Frequently Asked Questions”
Q. What are the maximum number of secondary IP addesses that can be configured on a router interface?
.A. There are no limits on configuring secondary IP addresses on a router interface.
Get More Information : Get 400-101 now
Money Back Guarantee
CertifyForAll has a remarkable Candidate Success record. We're confident of our products and provide a no hassle money back guarantee.
Who Chooses CertifyForAll
CertifyForAll is the world's largest certification preparation company with 99.3% Pass Rate History from 170344+ Satisfied Customers in 145 Countries.