Act now and download your Cisco 400 101 vce test today! Do not waste time for the worthless Cisco 400 101 vce tutorials. Download Abreast of the times Cisco CCIE Routing and Switching (v5.0) exam with real questions and answers and begin to learn Cisco ccie 400 101 with a classic professional.

Q431. DRAG DROP 

Drag and drop the DMVPN command on the left to the corresponding function on the right. 

Answer: 


Q432. Refer to the exhibit. 

Which statement is true? 

A. There is an MPLS network that is running 6PE, and the ingress PE router has no mpls ip propagate-ttl. 

B. There is an MPLS network that is running 6VPE, and the ingress PE router has no mpls ip propagate-ttl. 

C. There is an MPLS network that is running 6PE or 6VPE, and the ingress PE router has mpls ip propagate-ttl. 

D. There is an MPLS network that is running 6PE, and the ingress PE router has mpls ip propagate-ttl. 

E. There is an MPLS network that is running 6VPE, and the ingress PE router has mpls ip propagate-ttl. 

Answer:

Explanation: 

The second hop shows and IPV6 address over MPLS, so we know that there is an MPLS network running 6PE or 6VPE. And because the second and third hops show up in the traceroute. Then TTL is being propagated because if the “no ip propagate-ttl” command was used these devices would be hidden in the traceroute. 


Q433. Refer to the exhibit. 

Which technology can be used on the switch to enable host A to receive multicast packets for 239.2.2.2 but prevent host B from receiving them? 

A. IGMP filtering 

B. MLD snooping 

C. IGMP snooping 

D. MLD filtering 

Answer:

Explanation: 

IGMP snooping is the process of listening to Internet Group Management Protocol (IGMP) network traffic. The feature allows a network switch to listen in on the IGMP conversation between hosts and routers. By listening to these conversations the switch maintains a map of which links need which IP multicast streams. Multicasts may be filtered from the links which do not need them and thus controls which ports receive specific multicast traffic. 


Q434. Independent, multiple OSPF processes are entered on the same router, and the processes have the same destination route. Which OSPF process is used? 

A. The route with the fewest hops is used. 

B. Both processes are used to load balance the traffic. 

C. The first route process that places a route into the routing table is used. 

D. The route with the shortest prefix is used. 

Answer:


Q435. Which option describes the purpose of the leak-map keyword in the command eigrp stub connected leak-map EigrpLeak? 

A. It allows the specified static routes to be advertised. 

B. It allows exceptions to the route summarization that is configured. 

C. It allows specified EIGRP-learned routes to be advertised. 

D. It restricts specified connected routes from being advertised. 

Answer:

Explanation: 

ExamplE. eigrp stub leak-map Command 

In the following example, the eigrp stub command is issued with the leak-map name keyword-argument pair to configure the device to reference a leak map that identifies routes to be advertised that would have been suppressed otherwisE. 

Device(config)# router eigrp 1 

Device(config-router)# network 10.0.0.0 

Device(config-router)# eigrp stub leak-map map1 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_eigrp/configuration/15-mt/ire-15-mt-book/ire-eigrp-stub-rtg.html#GUID-FB899CA9-E9DE-48D8-8048-C971179E4E24 


Q436. Which IPv6 tunneling mechanism requires a service provider to use one of its own native IPv6 blocks to guarantee that its IPv6 hosts will be reachable? 

A. 6rd tunneling 

B. automatic 6to4 tunneling 

C. NAT-PT tunneling 

D. ISATAP tunneling 

E. manual ipv6ip tunneling 

F. automatic 4to6 tunneling 

Answer:


Q437. Which statement about the overload bit in IS-IS is true? 

A. The IS-IS adjacencies on the links for which the overload bit is set are brought down. 

B. Routers running SPF ignore LSPs with the overload bit set and hence avoid blackholing traffic. 

C. A router setting the overload bit becomes unreachable to all other routers in the IS-IS area. 

D. The overload bit in IS-IS is used only for external prefixes. 

Answer:

Explanation: 

The OL bit is used to prevent unintentional blackholing of packets in BGP transit networks. Due to the nature of these protocols, IS-IS and OSPF converge must faster than BGP. Thus there is a possibility that while the IGP has converged, IBGP is still learning the routes. In that case if other IBGP routers start sending traffic towards this IBGP router that has not yet completely converged it will start dropping traffic. This is because it isnt yet aware of the complete BGP routes. OL bit comes handy in such situations. When a new IBGP neighbor is added or a router restarts, the IS-IS OL bit is set. Since directly connected (including loopbacks) addresses on an “overloaded” router are considered by other routers, IBGP can be bought up and can begin exchanging routes. Other routers will not use this router for transit traffic and will route the packets out through an alternate path. Once BGP has converged, the OL bit is cleared and this router can begin forwarding transit traffic. 

Reference: https://routingfreak.wordpress.com/category/ospf-vs-is-is/ 


Q438. Which bit should be set in the link-state PDU of an IS-IS L1/L2 router to indicate that it is a potential exit point of the area? 

A. the ABR bit 

B. the ATT bit 

C. the down bit 

D. the P bit 

Answer:

Explanation: 

Default routing is achieved in two distinct ways with Integrated IS-IS: 

. Attached bit—Set by a Level 1/Level 2 router in its own Level 1 LSP and used to indicate to all Level 1 routers (within the area) that this router is a potential exit point of the area. Level 1-only routers will default to the nearest attached Level 2 router. 

. Default information originate—Can be configured in Level 1 as well as Level 2. The default route (0.0.0.0/0) is inserted in the router LSP (Level 1 or Level 2, according to the configuration command) and the LSP is flooded according to the router type (Level 1 or Level 2). A Level 2 router doesn't need to have a default route to originate a default route. 

Reference: http://www.cisco.com/en/US/products/ps6599/products_white_paper09186a00800a3e6f.sh tml 


Q439. Refer to the exhibit. 

All switches have default bridge priorities, and originate BPDUs with MAC addresses as indicated. The numbers shown are STP link metrics. Which two ports are forwarding traffic after STP converges? (Choose two.) 

A. The port connecting switch SWD with switch SWE 

B. The port connecting switch SWG with switch SWF 

C. The port connecting switch SWC with switch SWE 

D. The port connecting switch SWB with switch SWC 

Answer: C,D 

Explanation: 

Here, we know SWB to SWC are forwarding because we already identified the blocking port. So for the last correct answer let’s consider what must be done to prevent a switch loop between SWC/SWD/SWE. SWE to SWD will be blocked because SWC has a lower MAC address so it wins the forwarding port. And to look at it further, you could try to further understand what would happen with ports on SWG. Would the ports on SWG try to go through SWE or SWF? SWE has the lower MAC address so the port from SWG to SWE would win the forwarding election. Therefore, answer B could never be correct. 


Q440. Refer to the exhibit. 

Which two conditions can cause this error message to be displayed on the console? (Choose two.) 

A. The EtherChannel is configured as desirable on both ends. 

B. The port-channel on the adjacent device is misconfigured. 

C. There is a speed and duplex mismatch on interface fa0/12. 

D. The EtherChannel is configured as auto on one of the interfaces. 

Answer: B,C