★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/400-101-dumps.html


Every visitor with Actualtests can possess a try to require a quiz before purchasing. This stage can have a look at whats your weak details. And you should spend more attention about this weak places in after study. The particular Cisco Cisco 400-101 exam products contain the study guides, printable Pdf files and analyze engine software. Youll have access to be able to these Cisco 400-101 immediately when you spend for them at Actualtests. Actualtestss specialists have excellent influence inside the field involving IT. They have got compiled the Cisco Cisco exam questions and answers for most years. Each of our customers have obtained great achievements from your Cisco Cisco exam dumps. The professionals can give you valuable tips. All of the Cisco 400-101 practice materials tend to be original, logical along with technical. We maintain that you simply will get yourself a high passing score, or even full income back to be able to eliminate your worries.

2021 Oct ccie dumps 400-101:

Q291. Which statement is true when using a VLAN ID from the extended VLAN range (1006–4094)? 

A. VLANs in the extended VLAN range can be used with VTPv2 in either client or server mode. 

B. VLANs in the extended VLAN range can only be used as private VLANs. 

C. STP is disabled by default on extended-range VLANs. 

D. VLANs in the extended VLAN range cannot be pruned. 

Answer: D 

Explanation: 

Enabling VTP pruning on a VTP server enables pruning for the entire management domain. Making VLANs pruning-eligible or pruning-ineligible affects pruning eligibility for those VLANs on that device only (not on all switches in the VTP domain). VTP pruning takes effect several seconds after you enable it. VTP pruning does not prune traffic from VLANs that are pruning-ineligible. VLAN 1 and VLANs 1002 to 1005 are always pruning-ineligible; traffic from these VLANs cannot be pruned. Extended-range VLANs (VLAN IDs higher than 1005) are also pruning-ineligible. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3550/software/release/12-1_13_ea1/configuration/guide/3550scg/swvtp.html#wpxref48156 


Q292. Refer to the exhibit. 


Which statement is true about a valid IPv6 address that can be configured on tunnel interface0? 

A. There is not enough information to calculate the IPv6 address. 

B. 6to4 tunneling allows you to use any IPv6 address. 

C. 2001:7DCB:5901::/128 is a valid IPv6 address. 

D. 2002:7DCB:5901::/128 is a valid IPv6 address. 

Answer: D 

Explanation: 

Most IPv6 networks use autoconfiguration, which requires the last 64 bits for the host. The first 64 bits are the IPv6 prefix. The first 16 bits of the prefix are always 2002:, the next 32 bits are the IPv4 address, and the last 16 bits of the prefix are available for addressing multiple IPv6 subnets behind the same 6to4 router. Since the IPv6 hosts using autoconfiguration already have determined the unique 64 bit host portion of their address, they must simply wait for a Router Advertisement indicating the first 64 bits of prefix to have a complete IPv6 address. A 6to4 router will know to send an encapsulated packet directly over IPv4 if the first 16 bits are 2002, using the next 32 as the destination, or otherwise send the packet to a well-known relay server, which has access to native IPv6. 

Reference: http://en.wikipedia.org/wiki/6to4 


Q293. In the DiffServ model, which class represents the highest priority with the highest drop probability? 

A. AF11 

B. AF13 

C. AF41 

D. AF43 

Answer: D 

Explanation: 

AF43 — Assured forwarding, high drop probability, Class 4 DSCP, and Flash-override precedence. 

Table of AF Classes and Drop Priority 

Drop Precedence 

Class 1 

Class 2 

Class 3 

Class 4 

Low drop 

AF11 

DSCP 10 

001010 

AF21 

DSCP 18 

010010 

AF31 

DSCP 26 

011010 

AF41 

DSCP 34 

100010 

Medium drop 

AF12 

DSCP 12 

001100 

AF22 

DSCP 20 

010100 

AF32 

DSCP 28 

011100 

AF42 

DSCP 36 

100100 

High drop 

AF13 

DSCP 14 

001110 

AF23 

DSCP 22 

010110 

AF33 

DSCP 30 

011110 

AF43 

DSCP 38 

100110 

Reference: 

https://www.informit.com/library/content.aspx?b=CCIE_Practical_Studies_II&seqNum=56 


Q294. Which three statements about GET VPN are true? (Choose three.) 

A. It encrypts WAN traffic to increase data security and provide transport authentication. 

B. It provides direct communication between sites, which reduces latency and jitter. 

C. It can secure IP multicast, unicast, and broadcast group traffic. 

D. It uses a centralized key server for membership control. 

E. It enables the router to configure tunnels. 

F. It maintains full-mesh connectivity for IP networks. 

Answer: A,B,D 

Explanation: 

Cisco GET VPN Features and Benefits 

Feature 

Description and Benefit 

Key Services 

Key Servers are responsible for ensuring that keys are granted to authenticated and authorized devices only. They maintain the freshness of the key material, pushing re-key messages as well as security policies on a regular basis. The chief characteristics include: 

. Key Servers can be located centrally, granting easy control over membership. 

. Key Servers are not in the "line of fire" - encrypted application traffic flows directly between VPN end points without a bottleneck or an additional point of failure. 

. Supports both local and global policies, applicable to all members in a group - such as "Permit any any", a policy to encrypt all traffic. 

. Supports IP Multicast to distribute and manage keys, for improved efficiency; Unicast is also supported where IP Multicast is not possible. 

Scalability and Throughput 

. The full mesh nature of the solution allows devices to communicate directly with each other, without requiring transport through a central hub; this minimizes extra encrypts and decrypts at the hub router; it also helps minimize latency and jitter. 

. Efficient handling of IP Multicast traffic by using the core network for replication can boost effective throughput further 

Security 

Provides data security and transport authentication, helping to meet security compliance and internal regulation by encrypting all WAN traffic 

Reference: http://www.cisco.com/c/en/us/products/collateral/security/group-encrypted-transport-vpn/product_data_sheet0900aecd80582067.html 


Q295. Refer to the exhibit. 


R3 is failing to join the multicast group 224.1.1.1 that is sourcing from R1. Which two actions can you take to allow multicast traffic to flow correctly? (Choose two.) 

A. Remove the static multicast route on R1. 

B. Configure OSPF on R1 and R3 to include the tunnel interfaces. 

C. Add an additional static multicast route on R2 for multicast group 224.1.1.1 toward R3. 

D. Replace the static multicast route on R1 to send traffic toward R2. 

E. Remove the static unicast route on R1. 

F. Add an additional static unicast route on R2 toward the loopback interface of R3. 

Answer: A,B 

Explanation: 

Since the tunnel interfaces are not part of OSPF, the best path to the multicast source of R1 from R3 would be over the Gi0/0 path via OSPF. However, the static mroute is configured to use the tunnel, so this causes an RPF failure used in Sparse Mode. Best fix is to add the tunnel interfaces into OSPF and remove the static mroute so that that the RPF check no longer fails. 


400-101 real exam

Far out latest ccie r&s dumps:

Q296. In the DiffServ model, which class represents the lowest priority with the highest drop probability? 

A. AF11 

B. AF13 

C. AF41 

D. AF43 

Answer: B 

Explanation: 

Assured Forwarding (AF) Behavior Group 

Class 1 

Class 2 

Class 3 

Class 4 

Low Drop 

AF11 (DSCP 10) 

AF21 (DSCP 18) 

AF31 (DSCP 26) 

AF41 (DSCP 34) 

Med Drop 

AF12 (DSCP 12) 

AF22 (DSCP 20) 

AF32 (DSCP 28) 

AF42 (DSCP 36) 

High Drop 

AF13 (DSCP 14) 

AF23 (DSCP 22) 

AF33 (DSCP 30) 

AF43 (DSCP 38) 

Reference: http://en.wikipedia.org/wiki/Differentiated_services 


Q297. What is a reason to use DHCPv6 on a network that uses SLAAC? 

A. To get a record of the IPs that are used by the clients 

B. To push DNS and other information to the clients 

C. No reason, because there is no need for DHCPv6 when using SLAAC 

D. Because DHCPv6 can be used only in stateful mode with SLAAC to record the IPs of the clients 

E. Because DHCPv6 can be used only in stateless mode with SLAAC to record the IPs of the clients 

F. Because DHCPv6 is required to use first-hop security features on the switches 

Answer: B 

Explanation: 

SLAAC is by far the easiest way to configure IPv6 addresses, simply because you don’t have to configure any IPv6 address. With SLAAC, a host uses the IPv6 Neighbor Discovery Protocol (NDP) to determine its IP address and default routers. Using SLAAC, a host requests and listens for Router Advertisements (RA) messages, and then taking the prefix that is advertised to form a unique address that can be used on the network. For this to work, the prefix that is advertised must advertise a prefix length of 64 bits (i.e., /64). But the most significant of Stateless Address Autoconfiguration (SLAAC) is it provided no mechanism for configuring DNS resolver information.Therefore SLACC can be used along with DHCPv6 (Stateless) to push DNS and other information to the clients. 


Q298. Which mechanism can be used on Layer 2 switches so that only multicast packets with downstream receivers are sent on the multicast router-connected ports? 

A. IGMP snooping 

B. Router Guard 

C. PIM snooping 

D. multicast filtering 

Answer: C 

Explanation: 

Ideally, the Layer 2 device should forward the multicast transmission only out ports to which receivers are connected and also out any ports that are connected to downstream multicast routers. This configuration requires a Layer 2 device to be able to determine the ports on which multicast routers and receivers for each separate (S,G) or (*,G) multicast group are located. To facilitate intelligent forwarding of multicast traffic on the LAN, Cisco Catalyst switches support two mechanisms: 

. IGMP snooping — The switch listens in or "snoops" IGMP communications between receivers and multicast routers. This snooping enables the switch to determine which ports are connected to receivers for each multicast group and which ports are connected to multicast routers. 

. Cisco Group Management Protocol (CGMP) — The switch communicates with multicasts routers, with multicast routers relaying group membership information to switches. 

Reference: https://www.informit.com/library/content.aspx?b=CCNP_Studies_Switching&seqNum=59 


Q299. A service provider is deploying L2VPN LAN services in its MPLS cloud. Which statement is true regarding LDP signaling and autodiscovery? 

A. LDP signaling requires that each PE is identified, and that an LDP session is active with its P neighbor for autodiscovery to take place. 

B. LDP signaling requires that each P is identified, and that a targeted LDP session is active for autodiscovery to take place. 

C. LDP signaling requires that each PE is identified, and that a targeted LDP session with a BGP route reflector is active for autodiscovery to take place. 

D. LDP signaling requires that each PE is identified, and that a targeted LDP session is active for autodiscovery to take place. 

Answer: D 

Explanation: 

LDP signaling requires that each PE is identified and a targeted LDP session is active for autodiscovery to take place. Although the configuration can be automated using NMS/OSS the overall scalability of the solution is poor as a PE must be associated with all other PEs for LDP discovery to work, which can lead to a large number of targeted LDP sessions (n2), which may be largely unused as not all VPLS will be associated with every PE. The security attributes of LDP are reasonably good, although additional configuration is required to prevent unauthorized sessions being set up. Although LDP can signal additional attributes, it requires additional configuration either from an NMS/OSS or static configuration. 

Reference: http://www.cisco.com/en/US/products/hw/routers/ps368/products_white_paper09186a0080 1f6084.shtml 


Q300. Refer to the exhibit. 


Which statement is true? 

A. R1 routes this pseudowire over MPLS TE tunnel 1 with transport label 20. 

B. The default route 0.0.0.0/0 is available in the IPv4 routing table. 

C. R1 is using an MPLS TE tunnel for this pseudowire, because the IP path is not available. 

D. R1 has preferred-path configured for the pseudowire. 

Answer: D 

Explanation: 

Verifying the Configuration: Example In the following example, the show mpls l2transport vc command shows the following information (in bold) about the VCs: 

. VC 101 has been assigned a preferred path called Tunnel1. The default path is disabled because the preferred path specified that the default path should not be used if the preferred path fails. 

. VC 150 has been assigned an IP address of a loopback address on PE2. The default path can be used if the preferred path fails. 

Router# show mpls l2transport vc detail 

Local interface. Gi0/0/0.1 up, line protocol up, Eth VLAN 222 up 

Destination address: 10.16.16.16, VC ID. 101, VC status: up 

Preferred path: Tunnel1, active 

Default path: disabled

Tunnel label: 3, next hop point2point 

Output interfacE. Tu1, imposed label stack {17 16} 

Create timE. 00:27:31, last status change timE. 00:27:31 

Signaling protocol: LDP, peer 10.16.16.16:0 up 

MPLS VC labels: local 25, remote 16 

Group ID. local 0, remote 6 

MTU: local 1500, remote 1500 

Remote interface description: 

Sequencing: receive disabled, send disabled 

VC statistics: 

packet totals: receive 10, send 10 

byte totals: receive 1260, send 1300 

packet drops: receive 0, send 0 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2sr/12_2sra/feature/guide/srtunsel.html#wp10 57815