It is more faster and easier to pass the Cisco ccie 400 101 exam by using Validated Cisco CCIE Routing and Switching (v5.0) questuins and answers. Immediate access to the Abreast of the times ccie 400 101 Exam and find the same core area ccie 400 101 dumps questions with professionally verified answers, then PASS your exam with a high score now.

Q341. Which two protocols does the Management Plane Protection feature support? (Choose two.) 

A. ARP 

B. HTTPS 

C. TFTP 

D. OSPF 

Answer: B,C 


Q342. Which two fields reside in the initial CHAP challenge packet? (Choose two.) 

A. the authentication name of the challenger 

B. a random hash value generated by the device 

C. the hashed packet type ID 

D. the packet type ID in clear text 

Answer: A,D 

Explanation: 

When a caller A dials in to an access server B, The Access server sends across the link an initial Type 1 authentication packet called a Challenge. This Challenge packet contains a randomly generated number, an ID sequence number to identify the challenge (sent in clear text) and the authentication name of the challenger. 

Reference: http://www.rhyshaden.com/ppp.htm 


Q343. A service provider is deploying L2VPN LAN services in its MPLS cloud. Which statement is true regarding LDP signaling and autodiscovery? 

A. LDP signaling requires that each PE is identified, and that an LDP session is active with its P neighbor for autodiscovery to take place. 

B. LDP signaling requires that each P is identified, and that a targeted LDP session is active for autodiscovery to take place. 

C. LDP signaling requires that each PE is identified, and that a targeted LDP session with a BGP route reflector is active for autodiscovery to take place. 

D. LDP signaling requires that each PE is identified, and that a targeted LDP session is active for autodiscovery to take place. 

Answer:

Explanation: 

LDP signaling requires that each PE is identified and a targeted LDP session is active for autodiscovery to take place. Although the configuration can be automated using NMS/OSS the overall scalability of the solution is poor as a PE must be associated with all other PEs for LDP discovery to work, which can lead to a large number of targeted LDP sessions (n2), which may be largely unused as not all VPLS will be associated with every PE. The security attributes of LDP are reasonably good, although additional configuration is required to prevent unauthorized sessions being set up. Although LDP can signal additional attributes, it requires additional configuration either from an NMS/OSS or static configuration. 

Reference: http://www.cisco.com/en/US/products/hw/routers/ps368/products_white_paper09186a0080 1f6084.shtml 


Q344. External EIGRP route exchange on routers R1 and R2 was failing because the routers had duplicate router IDs. You changed the eigrp router-id command on R1, but the problem persists. Which additional action must you take to enable the routers to exchange routes? 

A. Change the corresponding loopback address. 

B. Change the router ID on R2. 

C. Reset the EIGRP neighbor relationship. 

D. Clear the EIGRP process. 

Answer:


Q345. Which three options are three benefits of an MPLS VPN? (Choose three.) 

A. It allows IP address space overlap by maintaining customer routes in a private routing table. 

B. It offers additional security by preventing intrusions directly into the customer routing table. 

C. It offers a transparent virtual network in which all customer sites appear on one LAN. 

D. It offers additional security by allowing only dynamic routing protocols between CE and PE routers. 

E. It allows IP address space overlap by maintaining customer routes in the global routing table with unique BGP communities. 

F. Providers can send only a default route for Internet access into the customer VPN. 

Answer: A,B,C 


Q346. Which statement about the function of poison reverse in EIGRP is true? 

A. It tells peers to remove paths that previously might have pointed to this router. 

B. It tells peers to remove paths to save memory and bandwidth. 

C. It provides reverse path information for multicast routing. 

D. It tells peers that a prefix is no longer reachable. 

Answer:

Explanation: 

Poison Reverse in EIGRP states: “Once you learn of a route through an interface, advertise it as unreachable back through that same interface”. For more information please read here. http://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/16406-eigrp-toc.html#splithorizon. 


Q347. Which TCP feature allows a client to request a specific packet that was lost? 

A. flow control 

B. sliding window 

C. fast recovery 

D. selective acknowledgment 

Answer:

Explanation: 

. TCP Selective Acknowledgment 

The TCP Selective Acknowledgment feature improves performance if multiple packets are lost from one TCP window of data. Prior to this feature, because of limited information available from cumulative acknowledgments, a TCP sender could learn about only one lost packet per-round-trip time. An aggressive sender could choose to resend packets early, but such re-sent segments might have already been successfully received. The TCP selective acknowledgment mechanism helps improve performance. The receiving TCP host returns selective acknowledgment packets to the sender, informing the sender of data that has been received. In other words, the receiver can acknowledge packets received out of order. The sender can then resend only missing data segments (instead of everything since the first missing packet). Prior to selective acknowledgment, if TCP lost packets 4 and 7 out of an 8-packet window, TCP would receive acknowledgment of only packets 1, 2, and 3. Packets 4 through 8 would need to be re-sent. With selective acknowledgment, TCP receives acknowledgment of packets 1, 2, 3, 5, 6, and 8. Only packets 4 and 7 must be re-sent. TCP selective acknowledgment is used only when multiple packets are dropped within one TCP window. There is no performance impact when the feature is enabled but not used. Use the ip tcp selective-ack command in global configuration mode to enable TCP selective acknowledgment. 

Refer to RFC 2018 for more details about TCP selective acknowledgment. 


Q348. Which statement describes the purpose of the Payload Type field in the RTP header? 

A. It identifies the signaling protocol. 

B. It identifies the codec. 

C. It identifies the port numbers for RTP. 

D. It identifies the port numbers for RTCP. 

Answer:

Explanation: 

PT, Payload Type. 7 bits: Identifies the format of the RTP payload and determines its interpretation by the application. A profile specifies a default static mapping of payload type codes to payload formats. Additional payload type codes may be defined dynamically through non-RTP means. An RTP sender emits a single RTP payload type at any given time; this field is not intended for multiplexing separate media streams. A full list of codecs and their payload type values can be found at the link below: 

Reference: http://www.networksorcery.com/enp/protocol/rtp.htm 


Q349. Which BGP feature allows a router to maintain its current BGP configuration while it advertises a different AS number to new connections? 

A. local-AS 

B. next-hop-self 

C. allow-AS in 

D. soft reset 

Answer:

Explanation: 

The local-AS feature allows a router to appear to be a member of a second autonomous system (AS), in addition to its real AS. This feature can only be used for true eBGP peers. The local-AS feature is useful if ISP-A purchases ISP-B, but ISP-B's customers do not want to modify any peering arrangements or configurations. The local-AS feature allows routers in ISP-B to become members of ISP-A's AS. At the same time, these routers appear to their customers to retain their ISP-B AS number. 

Reference: http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/13761-39.html 


Q350. Which two actions can you take to recover an interface in a errdisable state? (Choose two.) 

A. Enable UDLD on the switch. 

B. Enable errdisable recovery on the switch. 

C. Execute the shutdown command on the interface, followed by the no shutdown command. 

D. Remove the related commands from the configuration and reenter them. 

E. Enable loop guard on the switch. 

Answer: B,C