★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/400-101-dumps.html


We offer free updated Cisco 400-101 practice supplies for 120 days through the date of purchasing. You should check out the most up-to-date Cisco 400-101 exam dumps at Examcollection. And also download the Cisco 400-101 practice questions. Our study information will help you to prepare for the Cisco Cisco 400-101 coherently which usually guarantee the success in the real exam. Please feel free to contact us if you have got any questions. Our customer service are sold at anytime.

2021 Oct ccie written dumps 400-101:

Q431. Which two solutions can reduce UDP latency? (Choose two.) 

A. fast retransmission 

B. fast recovery 

C. fast start 

D. low-latency queuing 

E. IP service level agreements 

F. congestion-avoidance algorithm 

Answer: D,E 

Explanation: 

IP SLA uses active traffic monitoring, which generates traffic in a continuous, reliable, and predictable manner to measure network performance. IP SLA sends data across the network to measure performance between multiple network locations or across multiple network paths. It simulates network data and IP services, and collects network performance information in real time. This information is collected: 

Response times 

One-way latency, jitter (interpacket delay variance) 

Packet loss 

Network resource availability 

LLQ uses the priority command. The priority command allows you to set up classes based on a variety of criteria (not just User Datagram Ports (UDP) ports) and assign priority to them, and is available for use on serial interfaces and ATM permanent virtual circuits (PVCs). A similar command, the ip rtp priority command, allows you to stipulate priority flows based only on UDP port numbers. Note: All the other answer choices can be used to improve TCP performance, but not UDP. 

References: http://www.cisco.com/c/en/us/td/docs/routers/xr12000/software/xr12k_r4-2/system_monitoring/configuration/guide/b_sysmon_cg42xr12k/b_sysmon_cg42xr12k_chapter_011.html http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/fsllq26.html 


Q432. Refer to the exhibit. 


If the remaining configuration uses default values, what is the expected output of the show mls qos queue-set command? 

A) 

B) 

C) 

D) 

A. Exhibit A 

B. Exhibit B 

C. Exhibit C 

D. Exhibit D 

Answer: A 

Explanation: 

mls qos queue-set output qset-idthreshold queue-id drop-threshold1 drop-threshold2 reserved-threshold maximum-threshold 

Configure the WTD thresholds, guarantee the availability of buffers, and configure the maximum memory allocation for the queue-set (four egress queues per port). 

By default, the WTD thresholds for queues 1, 3, and 4 are set to 100 percent. The thresholds for queue 2 are set to 200 percent. The reserved thresholds for queues 1, 2, 3, 

and 4 are set to 50 percent. The maximum thresholds for all queues are set to 400 percent. 

. For qset-id , enter the ID of the queue-set specified in Step 2. The range is 1 to 2. 

. For queue-id , enter the specific queue in the queue-set on which the command is performed. The range is 1 to 4. 

. For drop-threshold1 drop-threshold2 , specify the two WTD thresholds expressed as a percentage of the queue’s allocated memory. Th e range is 1 to 3200 percent. 

. For reserved-threshold , enter the amount of memory to be guaranteed (reserved) for the queue expressed as a percentage of the allocated memory. The range is 1 to 100 percent. 

. For maximum-threshold , enable a queue in the full condition to obtain more buffers than are reserved for it. This is the maximum memory the queue can have before the packets are dropped if the common pool is not empty. The range is 1 to 3200 percent 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/1 2-2_55_se/configuration/guide/3750xscg/swqos.html 


Q433. Which two statements about SNMP are true? (Choose two.) 

A. SNMPv3 provides privacy and access control. 

B. All SNMP versions use get, getNext, and getBulk operations. 

C. SNMPv3 uses encrypted community strings. 

D. SNMPv1 and SNMPv2c use plaintext community strings. 

E. All SNMP versions support bulk retrieval and detailed error messages. 

Answer: A,B 


Q434. Which two statements about logging are true? (Choose two.) 

A. Log messages are sent to the console port by default. 

B. Log messages are displayed in a Telnet session by default. 

C. Interface status changes are logged at the Notification level. 

D. Interface status changes are logged at the Informational level. 

E. System restart messages are logged at the Critical level. 

F. Reload requests are logged at the Notification level. 

Answer: A,C 

Explanation: 

By default, switches send the output from system messages and debug privileged EXEC commands to a logging process. The logging process controls the distribution of logging messages to various destinations, such as the logging buffer, terminal lines, or a UNIX syslog server, depending on your configuration. The process also sends messages to the console. 

Table 29-3 Message Logging Level Keywords 

Level Keyword 

Level 

Description 

Syslog Definition 

emergencies 

System unstable 

LOG_EMERG 

alerts 

Immediate action needed 

LOG_ALERT 

critical 

Critical conditions 

LOG_CRIT 

errors 

Error conditions

LOG_ERR 

warnings 

Warning conditions 

LOG_WARNING 

notifications 

Normal but significant condition 

LOG_NOTICE 

informational 

Informational messages only 

LOG_INFO 

debugging 

Debugging messages 

LOG_DEBUG 

The software generates four other categories of messages: 

. Error messages about software or hardware malfunctions, displayed at levels warnings through emergencies. These types of messages mean that the functionality of the switch is affected. For information on how to recover from these malfunctions, see the system message guide for this release. 

. Output from the debug commands, displayed at the debugging level. Debug commands are typically used only by the Technical Assistance Center. 

Interface up or down transitions and system restart messages, displayed at the notifications level. This message is only for information; switch functionality is not affected. 

. Reload requests and low-process stack messages, displayed at the informational level. This message is only for information; switch functionality is not affected. 

References: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2950/software/release/12-

1_9_ea1/configuration/guide/scg/swlog.html

http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_55_se/configuration/guide/scg_2960/swlog.html 


Q435. DRAG DROP 

Drag and drop each EIGRP element on the left to the corresponding definition on the right. 


Answer: 



400-101 actual exam

Renovate 400-101 ccie routing and switching written exam fee:

Q436. Which statement about passive interfaces is true? 

A. The interface with the OSPF passive interface configuration appears as a not-so-stubby network. 

B. The interface with the EIGRP passive interface configuration ignores routes after the exchange of hello packets. 

C. The interface with the IS-IS passive interface configuration sends the IP address of that interface in the link-state protocol data units. 

D. Passive interface can be configured on the interface for IS-IS. 

Answer: C 

Explanation: 

With IS-IS, passive interfaces are used to prevent unnecessary LSA packets out that interface, but the IP address of passive interfaces are still included in updates going out the other interfaces. This behavior is what enables the best practice of configuring loopback interfaces as passive, but still having the loopback be reachable. 


Q437. Which three statements describe the characteristics of a VPLS architecture? (Choose three.) 

A. It forwards Ethernet frames. 

B. It maps MAC address destinations to IP next hops. 

C. It supports MAC address aging. 

D. It replicates broadcast and multicast frames to multiple ports. 

E. It conveys MAC address reachability information in a separate control protocol. 

F. It can suppress the flooding of traffic. 

Answer: A,C,D 

Explanation: 

As a VPLS forwards Ethernet frames at Layer 2, the operation of VPLS is exactly the same as that found within IEEE 802.1 bridges in that VPLS will self learn source MAC address to port associations, and frames are forwarded based upon the destination MAC address. Like other 802.1 bridges, MAC address aging is supported. 

Reference: http://www.cisco.com/en/US/products/hw/routers/ps368/products_white_paper09186a0080 1f6084.shtml 


Q438. For which kind of MPLS deployment is the next-hop-self all keyword used on a BGP neighbor command? 

A. 6VPE 

B. MPLS Carrier's carrier 

C. inter-AS MPLS VPN option D 

D. inter-AS MPLS VPN option C 

E. Unified MPLS 

Answer: E 

Explanation: 

Since the core and aggregation parts of the network are integrated and end-to-end LSPs are provided, the Unified MPLS solution is also referred to as "Seamless MPLS." New technologies or protocols are not used here, only MPLS, Label Distribution Protocol (LDP), IGP, and BGP. Since you do not want to distribute the loopback prefixes of the PE routers from one part of the network into another part, you need to carry the prefixes in BGP. The Internal Border Gateway Protocol (iBGP) is used in one network, so the next hop address of the prefixes is the loopback prefixes of the PE routers, which is not known by the IGP in the other parts of the network. This means that the next hop address cannot be used to recurse to an IGP prefix. The trick is to make the ABR routers Route Reflectors (RR) and set the next hop to self, even for the reflected iBGP prefixes. In order for this to work, a new knob is needed. Only the RRs need newer software to support this architecture. Since the RRs advertise the BGP prefixes with the next hop set to themselves, they assign a local MPLS label to the BGP prefixes. This means that in the data plane, the packets forwarded on these end-to-end LSPs have an extra MPLS label in the label stack. The RRs are in the forwarding path. There are two possible scenarios: 

. The ABR does not set the next hop to self for the prefixes advertised (reflected by BGP) by the ABR into the aggregation part of the network. Because of this, the ABR needs to redistribute the loopback prefixes of the ABRs from the core IGP into the aggregation IGP. If this is done, there is still scalability. Only the ABR loopback prefixes (from the core) need to be advertised into the aggregation part, not the loopback prefixes from the PE routers from the remote aggregation parts. 

. The ABR sets the next hop to self for the prefixes advertised (reflected by BGP) by the ABR into the aggregation part. Because of this, the ABR does not need to redistribute the loopback prefixes of the ABRs from the core IGP into the aggregation IGP. 

In both scenarios, the ABR sets the next hop to self for the prefixes advertised (reflected by BGP) by the ABR from the aggregation part of the network into the core part. If this is not done, the ABR needs to redistribute the loopback prefixes of the PEs from the aggregation IGP into the core IGP. If this is done, there is no scalability. In order to set the next hop to self for reflected iBGP routes, you must configure the neighbor x.x.x.x next-hop-self all command. 

Reference: http://www.cisco.com/c/en/us/support/docs/multiprotocol-label-switching-mpls/mpls/116127-configure-technology-00.html 


Q439. DRAG DROP 

Drag and drop the EIGRP term on the left to the corresponding definition on the right. 


Answer: 



Q440. Which AS_PATH attribute can you use to prevent loops when implementing BGP confederations? 

A. AS_CONFED_SET 

B. AS_SEQUENCE 

C. AS_CONFED_SEQUENCE 

D. AS_SET 

Answer: C