★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/400-101-dumps.html


Cisco 400-101 Official certifications Quiz is actually regarding main magnitude within your current Pro existence together with Official certifications Journey. In search of genuine 400-101 audit replies? Exambible is your most suitable choice. While using Exambible 400-101 Analysis Products, you do not solely get answers as you may well expect to have by Cisco 400-101 braindumps web-sites, and you buy certified together with precise facts which means you acquire a business knowledge from the information. Exambible is definitely the icon to get offering excellent together with cost-effective 400-101 audit together with 400-101 by using Exambible Cash back guarantee. Whenever we focus on Guranteed 400-101 Quiz Achievement, then you certainly run into a single brand that is Exambible. Thats likely top Achievement ration throughout Official certifications Entire world.

2021 Apr 400-101 torrent

Q131. Which three statements about the differences between Cisco IOS and IOS-XE functionality are true? (Choose three.) 

A. Only IOS-XE Software can host applications outside of the IOS context. 

B. Only the IOS-XE Services Plane has multiple cores. 

C. Only the IOS-XE Data Plane has multiple cores. 

D. Only the IOS-XE Control Plane has multiple cores. 

E. Only IOS-XE module management integrates with packet processing. 

F. Only IOS-XE configuration and control is integrated with the kernel. 

Answer: A,B,C 


Q132. Which two statements about Inverse ARP are true? (Choose two.) 

A. It uses the same operation code as ARP. 

B. It uses the same packet format as ARP. 

C. It uses ARP stuffing. 

D. It supports static mapping. 

E. It translates Layer 2 addresses to Layer 3 addresses. 

F. It translates Layer 3 addresses to Layer 2 addresses. 

Answer: B,E 

Explanation: 

Inverse Address Resolution Protocol (Inverse ARP or InARP) is used to obtain Network Layer addresses (for example, IP addresses) of other nodes from Data Link Layer (Layer 2) addresses. It is primarily used in Frame Relay (DLCI) and ATM networks, in which Layer 2 addresses of virtual circuits are sometimes obtained from Layer 2 signaling, and the corresponding Layer 3 addresses must be available before those virtual circuits can be used. 

Since ARP translates Layer 3 addresses to Layer 2 addresses, InARP may be described as its inverse. In addition, InARP is implemented as a protocol extension to ARP: it uses the same packet format as ARP, but different operation codes. 

Reference: http://en.wikipedia.org/wiki/Address_Resolution_Protocol 


Q133. Refer to the exhibit. 

Which action will solve the error state of this interface when connecting a host behind a Cisco IP phone? 

A. Configure dot1x-port control auto on this interface 

B. Enable errdisable recovery for security violation errors 

C. Enable port security on this interface 

D. Configure multidomain authentication on this interface 

Answer:

Explanation: 

In single-host mode, a security violation is triggered when more than one device are detected on the data vlan. In multidomain authentication mode, a security violation is triggered when more than one device are detected on the data or voice VLAN. Here we see that single host mode is being used, not multidomain mode. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/50sg/configuration/guide/Wrapper-46SG/dot1x.html#wp1309041 


Q134. Refer to the exhibit. 

Which statement is true? 

A. The output shows an IPv6 multicast address with link-local scope. 

B. The output shows an IPv6 multicast address that is used for unique local sources only. 

C. The output shows an IPv6 multicast address that can be used for BIDIR-PIM only. 

D. The output shows an IPv6 multicast address with embedded RP. 

Answer:


Q135. You are configuring a DMVPN spoke to use IPsec over a physical interface that is located within a VRF. For which three configuration sections must you specify the VRF name? (Choose three.) 

A. the ISAKMP profile 

B. the crypto keyring 

C. the IPsec profile 

D. the IPsec transform set 

E. the tunnel interface 

F. the physical interface 

Answer: B,E,F 

Explanation: 

ip vrf forwardingvrf-name 

Example: 

Router(config-if)# ip vrf forwarding green 

Associates a virtual private network (VPN) routing and forwarding (VRF) instance with an interface or subinterface. 

. vrf-name is the name assigned to a VRF. 

Router(config-if)# tunnel vrfvrf-name 

Example: 

Router(config-if)# tunnel vrf finance1 

Associates a VPN routing and forwarding (VRF) instance with a specific tunnel destination. vrf-name is the name assigned to a VRF. 

Router(config)# crypto keyringkeyring-name [vrf fvrf-name] 

Defines a crypto keyring to be used during IKE authentication and enters keyring configuration mode. 

. keyring-name—Name of the crypto keyring. 

. fvrf-name—(Optional) Front door virtual routing and forwarding (FVRF) name to which the keyring will be referenced. fvrf-name must match the FVRF name that was defined during virtual routing and forwarding (VRF) configuration 


Rebirth 400-101 test engine:

Q136. Which statement is true regarding UDLD and STP timers? 

A. The UDLD message timer should be two times the STP forward delay to prevent loops. 

B. UDLD and STP are unrelated features, and there is no relation between the timers. 

C. The timers need to be synced by using the spanning-tree udld-sync command. 

D. The timers should be set in such a way that UDLD is detected before the STP forward delay expires. 

Answer:

Explanation: 

UDLD is designed to be a helper for STP. Therefore, UDLD should be able to detect an unidirectional link before STP would unblock the port due to missed BPDUs. Thus, when you configure UDLD timers, make sure your values are set so that unidirectional link is detected before “STP MaxAge + 2xForwardDelay” expires. 

Reference: http://blog.ine.com/tag/stp/ 


Q137. Which three statements about EVCs are true? (Choose three.) 

A. Spanning Tree must use MST mode on EVC ports. 

B. PAGP is supported on EVC ports. 

C. Spanning Tree must use RSTP mode on EVC ports. 

D. LACP is supported on EVC ports. 

E. Layer 2 multicast framing is supported. 

F. Bridge domain routing is required. 

Answer: A,B,D 

Explanation: 

EVC support requires the following: 

–The spanning tree mode must be MST. 

–The dot1ad global configuration mode command must be configured. 

These Layer 2 port-based features can run with EVC configured on a port: 

–PAGP 

–LACP 

–UDLD 

–LLDP 

–CDP 

–MSTP 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SY/configuration/guide/sy_swcg/ethernet_virtual_connection.html 


Q138. Which two statements are true about unicast RPF? (Choose two.) 

A. Unicast RPF requires CEF to be enabled. 

B. Unicast RPF strict mode works better with multihomed networks. 

C. Unicast RPF strict mode supports symmetric paths. 

D. Unicast RPF strict mode supports asymmetric paths. 

E. CEF is optional with Unicast RPF, but when CEF is enabled it provides better performance. 

Answer: A,C 

Explanation: 

Unicast RPF requires Cisco express forwarding (CEF) to function properly on the router. 

Strict Versus Loose Checking Mode 

The Unicast RPF in Strict Mode feature filters ingress IPv4 traffic in strict checking mode and forwards packets only if the following conditions are satisfied. 

. An IPv4 packet must be received at an interface with the best return path (route) to the packet source (a process called symmetric routing). There must be a route in the Forwarding Information Base (FIB) that matches the route to the receiving interface. Adding a route in the FIB can be done via static route, network statement, or dynamic routing. 

. IPv4 source addresses at the receiving interface must match the routing entry for the interface. 

References: 

http://www.cisco.com/c/en/us/td/docs/ios/12_2/security/configuration/guide/fsecur_c/scfrpf. html 

http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/srpf_gsr.html 


Q139. DRAG DROP 

Drag each routing protocol on the left to the matching statement on the right. 

Answer: 


Q140. DRAG DROP 

Drag and Drop Cisco PFR adjacency types. 

Answer: