★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/400-101-dumps.html


2021 Apr 400-101 torrent

Q181. Which three features does GETVPN support to improve deployment and scalability? (Choose three.) 

A. configuration of multiple key servers to work cooperatively 

B. allowing traffic to be discarded until a group member registers successfully 

C. local exceptions in the traffic classification ACL 

D. GDOI protocol configuration between group members and the key server 

E. redundant IPsec tunnels between group members and the key server 

F. redundant multicast replication streaming through the use of a bypass tunnel 

Answer: A,B,C 


Q182. Which two statements about private VLANs are true? (Choose two.) 

A. Only one isolated VLAN can be mapped to a primary VLAN. 

B. Only one community VLAN can be mapped to a primary VLAN. 

C. Multiple isolated VLANs can be mapped to a primary VLAN. 

D. Multiple community VLANs can be mapped to a primary VLAN. 

Answer: A,D 

Explanation: 

An isolated VLAN is a secondary VLAN that carries unidirectional traffic upstream from the hosts toward the promiscuous ports. You can configure only one isolated VLAN in a PVLAN domain. An isolated VLAN can have several isolated ports. The traffic from each isolated port also remains completely separate. Only one isolated VLAN can be mapped under a given primary VLAN. A community VLAN is a secondary VLAN that carries upstream traffic from the community ports to the promiscuous port and to other host ports in the same community. You can configure multiple community VLANs in a PVLAN domain. The ports within one community can communicate, but these ports cannot communicate with ports in any other community or isolated VLAN in the private VLAN. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus6000/sw/layer2/6x/b_6k_L ayer2_Config_6x/b_6k_Layer2_Config_602N12_chapter_011.html 


Q183. Refer to the exhibit. 

R1 and R2 both advertise 10.50.1.0/24 to R3 and R4 as shown. R1 is the primary path. Which path does traffic take from the R4 data center to the file server? 

A. All traffic travels from R4 to R2 to the file server. 

B. All traffic travels from R4 to R3 to R1 to the file server. 

C. Traffic is load-balanced from R4 to R2 and R3. Traffic that is directed to R3 then continues to R1 to the file server. Traffic that is directed to R2 continues to the file server. 

D. All traffic travels from R4 to R2 to R1 to the file server. 

Answer:


Q184. EIGRP allows configuration of multiple MD5 keys for packet authentication to support easy rollover from an old key to a new key. Which two statements are true regarding the usage of multiple authentication keys? (Choose two.) 

A. Received packets are authenticated by the key with the smallest key ID. 

B. Sent packets are authenticated by all valid keys, which means that each packet is replicated as many times as the number of existing valid keys. 

C. Received packets are authenticated by any valid key that is chosen. 

D. Sent packets are authenticated by the key with the smallest key ID. 

Answer: C,D 

Explanation: 

Suppose two routers are connected with each other via Fa0/0 interfaces and they are configured to authenticate via MD5. Below is a simple configuration on both routers so that they will work: 

Router1(config)#key chain KeyChainR1 

Router1(config-keychain)#key 1 

Router1(config-keychain-key)#key-string FirstKey 

Router1(config-keychain-key)#key 2 

Router1(config-keychain-key)#key-string SecondKey 

Router2(config)#key chain KeyChainR2 

Router2(config-keychain)#key 1 

Router2(config-keychain-key)#key-string FirstKey 

Router2(config-keychain-key)#key 2 

Router2(config-keychain-key)#key-string SecondKey 

Apply these key chains to R1 & R2: 

Router1(config)#interface fastEthernet 0/0 

Router1(config-if)#ip authentication mode eigrp 1 md5 

Router1(config-if)#ip authentication key-chain eigrp 1 KeyChainR1 

Router2(config)#interface fastEthernet 0/0 

Router2(config-if)#ip authentication mode eigrp 1 md5 

Router2(config-if)#ip authentication key-chain eigrp 1 KeyChainR2 

There are some rules to configure MD5 authentication with EIGRP: 

+ The key chain names on two routers do not have to match (in this case the name “KeyChainR1 & “KeyChainR2 do not match) 

+ The key number and key-string on the two potential neighbors must match (for example “key 1 & “key-string FirstKey” must match on “key 1” & “key-string FirstKey” of neighboring router) Also some facts about MD5 authentication with EIGRP 

+ When sending EIGRP messages the lowest valid key number is used -> D is correct. 

+ When receving EIGRP messages all currently configured valid keys are verified but the lowest valid one will be used -> Although answer C does not totally mention like that but it is the most suitable answer because A and B are totally wrong. Answer A is not correct because we need valid key to authenticate. As mentioned above, although answer C is not totally correct but it puts some light on why 

answer B is not correct: each packet is NOT “replicated as many times as the number of existing valid keys”. All currently configured valid keys are verified but the lowest valid one will be used. 


Q185. Refer to the exhibit. 

While troubleshooting high CPU utilization on one of your Cisco Catalyst switches, you find that the issue is due to excessive flooding that is caused by STP. What can you do to prevent this issue from happening again? 

A. Disable STP completely on the switch. 

B. Change the STP version to RSTP. 

C. Configure PortFast on port-channel 1. 

D. Configure UplinkFast on the switch. 

E. Configure PortFast on interface Gi0/15. 

Answer:

Explanation: 

Topology Changes (TC) should be a rare event in a well-configured network. When a link on a switch port goes up or down, there is eventually a TC, once the STP state of the port is changing to or from forwarding. When the port is flapping, this would cause repetitive TCs and flooding. 

Ports with the STP portfast feature enabled will not cause TCs when going to or from the forwarding state. The configuration of portfast on all end-device ports (such as printers, PCs, and servers) should limit TCs to a low amount and is highly recommended. 

Reference: http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/28943-170.html 


Q186. Which two statements about redistribution are true? (Choose two.) 

A. When BGP traffic is redistributed into OSPF, the metric is set to 1 unless the metric is defined. 

B. When EIGRP routes on a CE are redistributed through a PE into BGP, the Cost Community POI is set automatically. 

C. When OSPF traffic is redistributed into BGP, internal and external routes are redistributed. 

D. When BGP traffic is redistributed into OSPF, eBGP and iBGP routes are advertised. 

E. iBGP routes automatically redistribute into the IGP if the routes are in the routing table. 

F. When EIGRP traffic is redistributed into BGP, a default metric is required. 

Answer: A,B 


Q187. Which configuration sets a minimum quality of service on a Layer 2 access switch? 

A. mls qos cos override 

mls qos cos 2 

B. mls qos cos 2 

C. mls qos trust cos 

mls qos cos 2 

D. mls qos trust cos 

E. mls qos trust dscp 

Answer:

Explanation: 

The mls qos cos override interface command must be used to ensure that untrusted CoS values are explicitly set 0 (default). 

Reference: http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/WAN_and_MAN/QoS_SRND/Qo S-SRND-Book/QoSDesign.html 


Q188. How many address families can a single OSPFv3 instance support? 

A. 1 

B. 2 

C. 5 

D. 10 

Answer:


Q189. Which three statements about SPAN traffic monitoring are true? (Choose three.) 

A. Traffic from a non-source VLAN is discarded when it arrives on a source VLAN. 

B. Multiple sessions can send traffic to an individual destination port. 

C. It supports up to 32 SPAN ports per switch. 

D. The destination port acts as a normal switchport. 

E. It supports up to 64 SPAN ports per switch. 

F. Only one session can send traffic to an individual destination port. 

Answer: A,E,F 

Explanation: 

You can create up to a total of 64 SPAN and ERSPAN sessions to define sources and destinations on the local device.You can also create a SPAN session to monitor multiple VLAN sources and choose only VLANs of interest to transmit on multiple destination ports. 

For example, you can configure SPAN on a trunk port and monitor traffic from different VLANs on different destination ports. 

You can configure a particular destination port in only one SPAN session. 

Traffic from a non-source VLAN is discarded when it arrives on a source VLAN. 

Reference: 

http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus1000/sw/4_0/troubleshooti 

ng/configuration/guide/n1000v_troubleshooting/trouble_15span.html 


Q190. Refer to the exhibit. 

Which option is the most likely explanation of the duplicate address message logged? 

A. HSRP misconfiguration 

B. a PC with IP of 10.10.1.1 

C. spanning-tree-loop 

D. a hardware problem 

Answer: