★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/400-101-dumps.html


Act now and download your Cisco 400-101 test today! Do not waste time for the worthless Cisco 400-101 tutorials. Download Abreast of the times Cisco CCIE Routing and Switching (v5.0) exam with real questions and answers and begin to learn Cisco 400-101 with a classic professional.

2021 Mar 400-101 exam

Q481. Assume that the following MAC addresses are used for the bridge ID MAC address by four different switches in a network. Which switch will be elected as the spanning-tree root bridge? 

A. SwitchA uses MAC 1000.AA-AA-AA-AA-AA-AA. 

B. SwitchB uses MAC 2000.BB-BB-BB-BB-BB-BB. 

C. SwitchC uses MAC 3000.CC-CC-CC-CC-CC-CC. 

D. SwitchD uses MAC 4000.DD-DD-DD-DD-DD-DD. 

Answer:

Explanation: 

The switch with the highest switch priority (the lowest numerical priority value) is elected as the root switch. If all switches are configured with the default priority (32768), the switch with the lowest MAC address in the VLAN becomes the root switch. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swstp.html 


Q482. Which topology allows the split-horizon rule to be safely disabled when using EIGRP? 

A. full mesh 

B. partial mesh 

C. hub and spoke 

D. ring 

Answer:


Q483. Refer to the exhibit. 

Which two statements about this capture are true? (Choose two.) 

A. It is set to run for five minutes. 

B. It continues to capture data after the buffer is full. 

C. It is set to run for a period of 00:03:26. 

D. It captures data only until the buffer is full. 

E. It is set to use the default buffer type. 

Answer: A,B 


Q484. Which two parameters does the Tunnel Mode Auto Selection feature select automatically? (Choose two.) 

A. the tunneling protocol 

B. the transport protocol 

C. the ISAKMP profile 

D. the transform-set 

E. the tunnel peer 

Answer: A,B 

Explanation: 

The Tunnel Mode Auto Selection feature eases the configuration and spares you about knowing the responder’s details. This feature automatically applies the tunneling protocol (GRE or IPsec) and transport protocol (IPv4 or IPv6) on the virtual template as soon as the IKE profile creates the virtual access interface. This feature is useful on dual stack hubs aggregating multivendor remote access, such as Cisco AnyConnect VPN Client, Microsoft Windows7 Client, and so on. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnips/configuration/xe-3s/sec-sec-for-vpns-w-ipsec-xe-3s-book/sec-ipsec-virt-tunnl.html 


Q485. Which timer expiration can lead to an EIGRP route becoming stuck in active? 

A. hello 

B. active 

C. query 

D. hold 

Answer:

Explanation: 

As noted above, when a route goes into the active state, the router queries its neighbors to find a path to the pertinent network. At this point, the router starts a three minute active timer by which time it must receive replies from all queried neighbors. If a neighbor has feasible successors for the route, it will recalculate its own local distance to the network and report this back. However, if a neighbor does not have a feasible successor, it also goes into active state. In some cases, multiple routers along multiple query paths will go into active state as routers continue to query for the desired route. In most cases, this process will yield responses from all queried routers and the sought after route will transition back into the passive state within the three minute SIA query timer. In the case that none of the queried routers can provide a feasible successor, the route is cleared. In some cases, a response is not received between two neighbor routers because of link failures, congestion or some other adverse condition in either the network or on the queried router, and the three minute active timer expires on the router originating the query. When this happens, the querying router that did not receive a response logs a “DUAL-3-SIA” or “stuck-in-active” error for the route and then drops and restarts its adjacency with the non-responding router 

Reference: http://www.packetdesign.com/resources/technical-briefs/diagnosing-eigrp-stuck-active 


Down to date 400-101 test:

Q486. Which two routing protocols are not directly supported by Cisco PfR route control, and rely on the Cisco PfR subfeature PIRO? (Choose two.) 

A. BGP 

B. EIGRP 

C. Static routing 

D. OSPF 

E. IS-IS 

Answer: D,E 

Explanation: 

Protocol Independent Route Optimization (PIRO) introduced the ability of Performance Routing (PfR) to search for a parent route—an exact matching route, or a less specific route—in the IP Routing Information Base (RIB), allowing PfR to be deployed in any IP-routed environment including Interior Gateway Protocols (IGPs) such as OSPF and IS-IS. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/pfr/configuration/guide/15_1/pfr_15_1_book/pfr-piro.html 


Q487. Which three statements about EIGRP and BFD are true? (Choose three.) 

A. BFD is independent of the routing protocol, so it can be used as a generic failure detection mechanism for EIGRP. 

B. Some parts of BFD can be distributed to the data plane, so it can be less CPU-intensive than reduced timers, which exist wholly at the control plane. 

C. Reduced EIGRP timers have an absolute minimum detection timer of 1-2 seconds; BFD can provide sub-second failure detection. 

D. BFD is tied to specific routing protocols and can be used for generic fault detection for the OSPF, EIGRP, and BGP routing protocols. 

E. BFD is dependent on the EIGRP routing protocol, so it can be used as a specific failure detection mechanism. 

F. BFD resides on the control plane, so it is less CPU-intensive than if it resided on the data plane. 

Answer: A,B,C 

Explanation: 

There are several advantages to implementing BFD over reduced timer mechanisms for routing protocols: 

. Although reducing the EIGRP, IS-IS, and OSPF timers can result in minimum detection timer of one to two seconds, BFD can provide failure detection in less than one second. 

. Because BFD is not tied to any particular routing protocol, it can be used as a generic and consistent failure detection mechanism for EIGRP, IS-IS, and OSPF. 

. Because some parts of BFD can be distributed to the data plane, it can be less CPU-intensive than the reduced EIGRP, IS-IS, and OSPF timers, which exist wholly at the control plane. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/fs_bfd.html 


Q488. Which neighbor-discovery message type is used to verify connectivity to a neighbor when the link-layer address of the neighbor is known? 

A. neighbor solicitation 

B. neighbor advertisement 

C. router advertisement 

D. router solicitation 

Answer:

Explanation: 

IPv6 Neighbor Solicitation Message A value of 135 in the Type field of the ICMP packet header identifies a neighbor solicitation message. Neighbor solicitation messages are sent on the local link when a node wants to determine the link-layer address of another node on the same local link (see the figure below). When a node wants to determine the link-layer address of another node, the source address in a neighbor solicitation message is the IPv6 address of the node sending the neighbor solicitation message. The destination address in the neighbor solicitation message is the solicited-node multicast address that corresponds to the IPv6 address of the destination node. The neighbor solicitation message also includes the link-layer address of the source node. 

Figure 1. IPv6 Neighbor Discovery: Neighbor Solicitation Message 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_basic/configuration/xe-3s/ip6b-xe-3s-book/ip6-neighb-disc-xe.html 


Q489. Which two statements about port ACLs are true? (Choose two.) 

A. Port ACLs are supported on physical interfaces and are configured on a Layer 2 interface on a switch. 

B. Port ACLs support both outbound and inbound traffic filtering. 

C. When it is applied to trunk ports, the port ACL filters only native VLAN traffic. 

D. When it is applied to a port with voice VLAN, the port ACL filters both voice and data VLAN traffic. 

Answer: A,D 

Explanation: 

PACLs filter incoming traffic on Layer 2 interfaces, using Layer 3 information, Layer 4 header information, or non-IP Layer 2 information The port ACL (PACL) feature provides the ability to perform access control on specific Layer 2 ports. A Layer 2 port is a physical LAN or trunk port that belongs to a VLAN. Port ACLs perform access control on all traffic entering the specified Layer 2 port, including voice and data VLANs that may be configured on the port. Port ACLs are applied only on the ingress traffic. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SY/configuration/guide/sy_swcg/port_acls.html 


Q490. Where should the passive-interface command be used? 

A. Under the routing process for interfaces that need to be routed, but prevented from peering 

B. under the routing process for interfaces that need to be routed and allowed to peer 

C. under the interface configuration for interfaces that need to be routed, but prevented from peering 

D. under the interface configuration for interfaces that need to be routed and allowed to peer 

E. under the VTY configuration within global configuration mode 

Answer:

Explanation: 

Passive-interface is a feature you enable on a per interface basis which allows a particular interface to participate in a routing process but prevents that interface from forming neighbor relationships by not sending hello packets and discarding received hello packets.