★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/400-101-dumps.html


It is impossible to pass Cisco 400-101 exam without any help in the short term. Come to Ucertify soon and find the most advanced, correct and guaranteed Cisco 400-101 practice questions. You will get a surprising result by our Replace CCIE Routing and Switching (v5.0) practice guides.

2021 Apr 400-101 practice test

Q421. When you migrate a network from PVST+ to rapid-PVST+, which two features become inactive? (Choose two.) 

A. Root guard 

B. Loop guard 

C. UplinkFast 

D. UDLD 

E. BackboneFast 

F. Bridge Assurance 

Answer: C,E 

Explanation: 

It is good to know the UplinkFast and BackboneFast behavior before you start the migration process. 

Here, the Access1 switch runs Cisco IOS. This output is taken before migration to the rapid-PVST+ mode: 

Access1#show spanning-tree vlan 10 

VLAN0010 

Spanning tree enabled protocol ieee 

Root ID Priority 24586 

Address 0015.63f6.b700 

Cost 3019 

Port 107 (FastEthernet3/0/1) 

Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec 

Bridge ID Priority 49162 (priority 49152 sys-id-ext 10) 

Address 000f.f794.3d00 

Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec 

Aging Time 300 

Uplinkfast enabled 

Interface Role Sts Cost Prio.Nbr Type 

Fa3/0/1 Root FWD 3019 128.107 P2p 

Fa3/0/2 Altn BLK 3019 128.108 P2p 

Access1#show spanning-tree summary 

Switch is in pvst mode 

Root bridge for: none 

Extended system ID is enabled 

Portfast Default is disabled 

PortFast BPDU Guard Default is enabled 

Portfast BPDU Filter Default is disabled 

Loopguard Default is disabled 

EtherChannel misconfig guard is enabled 

UplinkFast is enabled 

BackboneFast is enabled 

Configured Pathcost method used is short 

Name Blocking Listening Learning Forwarding STP Active 

VLAN0010 1 0 0 1 2 

VLAN0020 1 0 0 1 2 

2 vlans 2 0 0 2 4 

This output is taken after the mode is changed to rapid-PVST+: 

Access1#show spanning-tree vlan 10 

VLAN0010 

Spanning tree enabled protocol rstp 

Root ID Priority 24586 

Address 0015.63f6.b700 

Cost 3019 

Port 107 (FastEthernet3/0/1) 

Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec 

Bridge ID Priority 49162 (priority 49152 sys-id-ext 10) 

Address 000f.f794.3d00 

Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec 

Aging Time 300 

UplinkFast enabled but inactive in rapid-pvst mode 

Interface Role Sts Cost Prio.Nbr Type 

Fa3/0/1 Root FWD 3019 128.107 P2p 

Fa3/0/2 Altn BLK 3019 128.108 P2p 

Access1#show spanning-tree summary 

Switch is in rapid-pvst mode 

Root bridge for: none 

Extended system ID is enabled 

Portfast Default is disabled 

PortFast BPDU Guard Default is enabled 

Portfast BPDU Filter Default is disabled 

Loopguard Default is disabled 

EtherChannel misconfig guard is enabled 

UplinkFast is enabled but inactive in rapid-pvst mode 

BackboneFast is enabled but inactive in rapid-pvst mode 

Configured Pathcost method used is short 

Name Blocking Listening Learning Forwarding STP Active 

VLAN0010 1 0 0 1 2 

VLAN0020 1 0 0 1 2 

2 vlans 2 0 0 2 4 

You can see in the show spanning-tree summary command output that UplinkFast and BackboneFast are enabled, but are inactive in rapid-PVST mode. 

Reference: http://www.cisco.com/c/en/us/support/docs/switches/catalyst-6500-series-switches/72836-rapidpvst-mig-config.html#upback1 


Q422. Which three roles does a key server perform when used with GETVPN? (Choose three.) 

A. It authenticates group members. 

B. It manages security policies. 

C. It creates group keys. 

D. It distributes multicast replication policies. 

E. It distributes multicast replication keys. 

F. It configures and routes the GDOI protocol. 

Answer: A,B,C 

Explanation: 

Key server is responsible for maintaining security policies, authenticating the Group Members and providing the session key for encrypting traffic. KS authenticates the individual GMs at the time of registration. Only after successful registration the GMs can participate in group SA. 

Reference: http://www.cisco.com/c/en/us/products/collateral/security/group-encrypted-transport-vpn/deployment_guide_c07_554713.html 


Q423. DRAG DROP 

Drag and drop the EIGRP term on the left to the corresponding definition on the right. 

Answer: 


Q424. What is Nagle's algorithm used for? 

A. To increase the latency 

B. To calculate the best path in distance vector routing protocols 

C. To calculate the best path in link state routing protocols 

D. To resolve issues caused by poorly implemented TCP flow control. 

Answer:

Explanation: 

Silly window syndrome is a problem in computer networking caused by poorly implemented TCP flow control. A serious problem can arise in the sliding window operation when the sending application program creates data slowly, the receiving application program consumes data slowly, or both. If a server with this problem is unable to process all incoming data, it requests that its clients reduce the amount of data they send at a time (the window setting on a TCP packet). If the server continues to be unable to process all incoming data, the window becomes smaller and smaller, sometimes to the point that the data transmitted is smaller than the packet header, making data transmission extremely inefficient. The name of this problem is due to the window size shrinking to a "silly" value. When there is no synchronization between the sender and receiver regarding capacity of the flow of data or the size of the packet, the window syndrome problem is created. When the silly window syndrome is created by the sender, Nagle's algorithm is used. Nagle's solution requires that the sender sends the first segment even if it is a small one, then that it waits until an ACK is received or a maximum sized segment (MSS) is accumulated. 

Reference: http://en.wikipedia.org/wiki/Silly_window_syndrome 


Q425. Which three options are sub-subfields of the IPv4 Option Type subfield? (Choose three.) 

A. Option Class 

B. GET 

C. Copied 

D. PUSH 

E. Option Number 

F. TTL 

Answer: A,C,E 

Explanation: 

Each IP option has its own subfield format, generally structured as shown below. For most options, all three subfields are used. Option Type, Option Length and Option Data. 

Reference: http://www.tcpipguide.com/free/t_IPDatagramOptionsandOptionFormat.htm 


Far out 400-101 torrent:

Q426. Which two statements about OSPFv3 are true? (Choose two.) 

A. It supports unicast address families for IPv4 and IPv6. 

B. It supports unicast address families for IPv6 only. 

C. It supports only one address family per instance. 

D. It supports the use of a cluster ID for loop prevention. 

E. It supports multicast address families for IPv4 and IPv6. 

F. It supports multicast address families for IPv6 only. 

Answer: A,C 


Q427. What is a reason to use DHCPv6 on a network that uses SLAAC? 

A. To get a record of the IPs that are used by the clients 

B. To push DNS and other information to the clients 

C. No reason, because there is no need for DHCPv6 when using SLAAC 

D. Because DHCPv6 can be used only in stateful mode with SLAAC to record the IPs of the clients 

E. Because DHCPv6 can be used only in stateless mode with SLAAC to record the IPs of the clients 

F. Because DHCPv6 is required to use first-hop security features on the switches 

Answer:

Explanation: 

SLAAC is by far the easiest way to configure IPv6 addresses, simply because you don’t have to configure any IPv6 address. With SLAAC, a host uses the IPv6 Neighbor Discovery Protocol (NDP) to determine its IP address and default routers. Using SLAAC, a host requests and listens for Router Advertisements (RA) messages, and then taking the prefix that is advertised to form a unique address that can be used on the network. For this to work, the prefix that is advertised must advertise a prefix length of 64 bits (i.e., /64). But the most significant of Stateless Address Autoconfiguration (SLAAC) is it provided no mechanism for configuring DNS resolver information.Therefore SLACC can be used along with DHCPv6 (Stateless) to push DNS and other information to the clients. 


Q428. Which technology is an application of MSDP, and provides load balancing and redundancy between the RPs? 

A. static RP 

B. PIM BSR 

C. auto RP 

D. anycast RP 

Answer:

Explanation: 

Using Anycast RP is an implementation strategy that provides load sharing and redundancy in Protocol Independent Multicast sparse mode (PIM-SM) networks. Anycast RP allows two or more rendezvous points (RPs) to share the load for source registration and the ability to act as hot backup routers for each other. Multicast Source Discovery Protocol (MSDP) is the key protocol that makes Anycast RP possible. 

Reference: www.cisco.com/c/en/us/td/docs/ios/solutions_docs/ip_multicast/White_papers/anycast.html 


Q429. Which algorithm heavily influenced the algorithm used by path-vector protocols? 

A. Bellman-Ford 

B. SPF 

C. DUAL 

D. Spanning-Tree 

E. Adaptive 

F. Deflection 

Answer:

Explanation: 

A path vector protocol is a computer network routing protocol which maintains the path information that gets updated dynamically. Updates which have looped through the network and returned to the same node are easily detected and discarded. This algorithm is sometimes used in Bellman–Ford routing algorithms to avoid "Count to Infinity" problems. 

Reference: http://en.wikipedia.org/wiki/Path_vector_protocol 


Q430. DRAG DROP 

Drag and drop each SNMP security model and level on the left to the corresponding mode of authentication on the right. 

Answer: