Proper study guides for Improve Cisco CCIE Routing and Switching (v5.0) certified begins with Cisco 400 101 pdf preparation products which designed to deliver the Highest Quality 400 101 pdf questions by making you pass the cisco 400 101 test at your first time. Try the free 400 101 dumps demo right now.
Q211. Which two options are interface requirements for turbo flooding? (Choose two.)
A. The interface is Ethernet.
B. The interface is configured for ARPA encapsulation.
C. The interface is PPP.
D. The interface is configured for GRE encapsulation.
E. The interface is configured for 802.1Q encapsulation.
In the switch, the majority of packets are forwarded in hardware; most packets do not go through the switch CPU. For those packets that do go to the CPU, you can speed up spanning tree-based UDP flooding by a factor of about four to five times by using turbo-flooding. This feature is supported over Ethernet interfaces configured for ARPA encapsulation.
Q212. Refer to the exhibit.
Which BGP feature allows R1 to instruct R2 which prefixes it is allowed to advertise to R1?
A. route refresh
B. Prefix-Based Outbound Route Filtering
C. distribute lists
D. prefix lists
Q213. Which three statements about RIP timers are true? (Choose three.)
A. The default update timer is 30 seconds.
B. The default invalid timer is 180 seconds.
C. The default holddown timer is 180 seconds.
D. The default flush timer is 60 seconds.
E. The default scan timer is 60 seconds.
F. The default hello timer is 5 seconds.
The routing information protocol uses the following timers as part of its operation:
The update timer controls the interval between two gratuitous Response Message. By default the value is 30 seconds. The response message is broadcast to all its RIP enabled interface.
The invalid timer specifies how long a routing entry can be in the routing table without being updated. This is also called as expiration Timer. By default, the value is 180 seconds. After the timer expires the hop count of the routing entry will be set to 16, marking the destination as unreachable.
The flush timer controls the time between the route is invalidated or marked as unreachable and removal of entry from the routing table. By default the value is 240 seconds. This is 60 seconds longer than Invalid timer. So for 60 seconds the router will be advertising about this unreachable route to all its neighbors. This timer must be set to a higher value than the invalid timer.
The hold-down timer is started per route entry, when the hop count is changing from lower value to higher value. This allows the route to get stabilized. During this time no update can be done to that routing entry. This is not part of the RFC 1058. This is Cisco's implementation. The default value of this timer is 180 seconds.
Q214. DRAG DROP
Drag and drop the argument of the ip cef load-sharing algorithm command on the left to the function it performs on the right.
Q215. Which two statements about IS-IS are true? (Choose two.)
A. The default hello interval is 10 seconds and the default hold timer is 30 seconds.
B. The hello interval can be changed on a per-interface basis with the command isis hello-multiplier.
C. Both routers need to have the same hello intervals and hold timers in order to form IS-IS neighbors.
D. Both IS-IS routers need to have the same capabilities in the hello packet in order to form neighbors.
To specify the length of time between hello packets that the Cisco IOS software sends, use the isis hello-interval command in interface configuration mode. By default, a value three times the hello interval seconds is advertised as the hold time in the hello packets sent. (Change the multiplier of 3 by specifying the isis hello-multiplier command.) With smaller hello intervals, topological changes are detected faster, but there is more routing traffic. The default is 10 seconds.
Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/iproute/command/reference/fiprrp_r/1rfisis.ht ml
Q216. Which two statements about BGP loop prevention are true? (Choose two.)
A. Advertisements from PE routers with per-neighbor SOO configured include a Site of Origin value that is equal to the configured value of the BGP peering.
B. If the configured Site of Origin value of a BGP peering is equal to the Site of Origin value on a route it receives, route advertisement is blocked to prevent a route loop.
C. AS-override aids BGP loop prevention, but alternate loop prevention mechanisms are also necessary.
D. Advertisements from the neighbors a BGP peering include a Site of Origin value that is separate from the configured value of the BGP peering.
E. If the configured Site of Origin value of a BGP peering is greater than the Site of Origin value on a route it receives, route advertisement is blocked to prevent a route loop.
F. If the configured Site of Origin value of a BGP peering is equal to the Site of Origin value on a route it receives, route advertisement is permitted.
Q217. Which three statements about EVCs are true? (Choose three.)
A. Spanning Tree must use MST mode on EVC ports.
B. PAGP is supported on EVC ports.
C. Spanning Tree must use RSTP mode on EVC ports.
D. LACP is supported on EVC ports.
E. Layer 2 multicast framing is supported.
F. Bridge domain routing is required.
EVC support requires the following:
–The spanning tree mode must be MST.
–The dot1ad global configuration mode command must be configured.
These Layer 2 port-based features can run with EVC configured on a port:
Q218. Which three statements about GET VPN are true? (Choose three.)
A. It encrypts WAN traffic to increase data security and provide transport authentication.
B. It provides direct communication between sites, which reduces latency and jitter.
C. It can secure IP multicast, unicast, and broadcast group traffic.
D. It uses a centralized key server for membership control.
E. It enables the router to configure tunnels.
F. It maintains full-mesh connectivity for IP networks.
Cisco GET VPN Features and Benefits
Description and Benefit
Key Servers are responsible for ensuring that keys are granted to authenticated and authorized devices only. They maintain the freshness of the key material, pushing re-key messages as well as security policies on a regular basis. The chief characteristics include:
. Key Servers can be located centrally, granting easy control over membership.
. Key Servers are not in the "line of fire" - encrypted application traffic flows directly between VPN end points without a bottleneck or an additional point of failure.
. Supports both local and global policies, applicable to all members in a group - such as "Permit any any", a policy to encrypt all traffic.
. Supports IP Multicast to distribute and manage keys, for improved efficiency; Unicast is also supported where IP Multicast is not possible.
Scalability and Throughput
. The full mesh nature of the solution allows devices to communicate directly with each other, without requiring transport through a central hub; this minimizes extra encrypts and decrypts at the hub router; it also helps minimize latency and jitter.
. Efficient handling of IP Multicast traffic by using the core network for replication can boost effective throughput further
Provides data security and transport authentication, helping to meet security compliance and internal regulation by encrypting all WAN traffic
Q219. Which three actions are required when configuring NAT-PT? (Choose three.)
A. Enable NAT-PT globally.
B. Specify an IPv4-to-IPv6 translation.
C. Specify an IPv6-to-IPv4 translation.
D. Specify a ::/96 prefix that will map to an IPv4 address.
E. Specify a ::/48 prefix that will map to a MAC address.
F. Specify a ::/32 prefix that will map to an IPv6 address.
The detailed steps on configuring NAY-PT is found at the reference link below:
Reference: http://www.cisco.com/c/en/us/td/docs/ios/ipv6/configuration/guide/12_4t/ipv6_12_4t_book/i p6-nat_trnsln.html
Q220. DRAG DROP
Drag and drop the OSPF network type on the left to the correct category of timers on the right.