★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/400-101-dumps.html


Q201. What is the purpose of EIGRP summary leaking? 

A. to allow a summary to be advertised conditionally on specific criteria 

B. to allow a component of a summary to be advertised in addition to the summary 

C. to allow overlapping summaries to exist on a single interface 

D. to modify the metric of the summary based on which components of the summary are operational 

Answer:

Explanation: 

When you do manual summarization, and still you want to advertise some specific routes to the neighbor, you can do that using leak-map. Please read more about leaking routes here. 

http://www.cisco.com/c/en/us/td/docs/ios/iproute_eigrp/command/reference/ire_book/ire_i1. html#wp1037685. 


Q202. Refer to the exhibit. 

If EIGRP is configured between two routers as shown in this output, which statement about their EIGRP relationship is true? 

A. The routers will establish an EIGRP relationship successfully. 

B. The routers are using different authentication key-strings. 

C. The reliability metric is enabled. 

D. The delay metric is disabled. 

Answer:

Explanation: 

The 5 K values used in EIGRP are: 

K1 = Bandwidth modifier 

K2 = Load modifier 

K3 = Delay modifier 

K4 = Reliability modifier 

K5 = Additional Reliability modifier 

However, by default, only K1 and K3 are used (bandwidth and delay). In this output we see that K1, K3, and K4 (Reliability) are all set. 


Q203. Refer to the exhibit. 

Which statement about this IP SLA is true? 

A. The SLA must also have a schedule configured before it will start. 

B. The TTL of the SLA packets is 10. 

C. The SLA has a timeout of 3.6 seconds. 

D. The SLA has a lifetime of 5 seconds. 

Answer:

Explanation: 

When you configure an IP SLAs operation, you must schedule the operation to begin capturing statistics and collecting error information. You can schedule an operation to start immediately or to start at a certain month, day, and hour. You can use the pending option to set the operation to start at a later time. The pending option is an internal state of the operation that is visible through SNMP. The pending state is also used when an operation is a reaction (threshold) operation waiting to be triggered. You can schedule a single IP SLAs operation or a group of operations at one time. We can see in this output that the IP SLA is still in a pending trigger state. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/44sg/configuration/guide/Wrapper-44SG/swipsla.html 


Q204. Refer to the exhibit. 

While configuring AAA with a local database, users can log in via Telnet, but receive the message "error in authentication" when they try to go into enable mode. Which action can solve this problem? 

A. Configure authorization to allow the enable command. 

B. Use aaa authentication login default enable to allow authentication when using the enable command. 

C. Verify whether an enable password has been configured. 

D. Use aaa authentication enable default enable to allow authentication when using the enable command. 

Answer:

Explanation: 

If a different enable password is configured, it will override the privilege level 15 of that user and force the existing password to be used for enable access. 


Q205. Which two statements about the OSPF two-way neighbor state are true? (Choose two.) 

A. Each neighbor receives its own router ID in a hello packet from the other neighbor. 

B. Each neighbor receives a hello message from the other neighbor. 

C. It is valid only on NBMA networks. 

D. It is valid only on point-to-point networks. 

E. Each neighbor receives an acknowledgement of its own hello packet from the other neighbor. 

F. Each neighbor receives the router ID of the other neighbor in a hello packet from the other neighbor. 

Answer: A,E 


Q206. Which command correctly configures standby tracking for group 1 using the default decrement priority value? 

A. standby 1 track 100 

B. standby 1 track 100 decrement 1 

C. standby 1 track 100 decrement 5 

D. standby 1 track 100 decrement 20 

Answer:


Q207. Which statement describes the function of rekey messages? 

A. They prevent unencrypted traffic from passing through a group member before registration. 

B. They refresh IPsec SAs when the key is about to expire. 

C. They trigger a rekey from the server when configuring the rekey ACL. 

D. They authenticate traffic passing through a particular group member. 

Answer:

Explanation: 

Rekey messages are used to refresh IPsec SAs. When the IPsec SAs or the rekey SAs are about to expire, one single rekey message for a particular group is generated on the key server. No new IKE sessions are created for the rekey message distribution. The rekey messages are distributed by the key server over an existing IKE SA. Rekeying can use multicast or unicast messages. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_getvpn/configuration/xe-3s/sec-get-vpn-xe-3s-book/sec-get-vpn.html 


Q208. DRAG DROP 

Drag and drop each MLPPP command on the left to the function it performs on the right. 

Answer: 


Q209. Which three statements about Cisco HDLC are true? (Choose three.) 

A. HDLC serial encapsulation provides asynchronous framing and error detection. 

B. Serial link keepalives are maintained by SLARP. 

C. HDLC serial encapsulation provides synchronous framing without retransmission. 

D. HDLC frame size can be reduced with MPPC compression. 

E. The interface is brought down after five ignored keepalives. 

F. The interface is brought down after three ignored keepalives. 

Answer: B,C,F 

Explanation: 

Cisco High-Level Data Link Controller (HDLC) is the Cisco proprietary protocol for sending data over synchronous serial links using HDLC. Cisco HDLC also provides a simple control protocol called Serial Line Address Resolution Protocol (SLARP) to maintain serial link keepalives. For each encapsulation type, a certain number of keepalives ignored by a peer triggers the serial interface to transition to the down state. For HDLC encapsulation, three ignored keepalives causes the interface to be brought down. By default, synchronous serial lines use the High-Level Data Link Control (HDLC) serial encapsulation method, which provides the synchronous framing and error detection functions of HDLC without windowing or retransmission. 

Reference: http://www.cisco.com/c/en/us/td/docs/routers/access/800/819/software/configuration/Guide/ 819_SCG/6ser_conf.html#78662 


Q210. Which three types of traffic are protected when you implement IPsec within an IPv6-in-IPv4 tunnel? (Choose three.) 

A. IPv6 link-local traffic 

B. IPv6 multicast traffic 

C. IPv6 unicast traffic 

D. IPv4 tunnel control traffic 

E. IPv4 broadcast traffic 

F. IPv6 broadcast traffic 

Answer: A,B,C