There is an interactive space upon Ucertify. You can chat to examinees. Learn via each other as well as make progress together. The actual candidates who have handed the Cisco 400-101 exam can pass on their own wisdom to you. Help to make full use of their Cisco test notes. They may be an invaluable asset to your Cisco Cisco exam preparation. You will find the most advanced, right and guaranteed Cisco 400-101 exam questions as well as answers. You will become ready to the Cisco 400-101 exam questions on the test day. Learn more 400-101 expertise and lay a solid foundation for advancements in Cisco Cisco 400-101 career.
2021 Apr 400-101 actual exam
Q131. Which statement about the feasible distance in EIGRP is true?
A. It is the maximum metric that should feasibly be considered for installation in the RIB.
B. It is the minimum metric to reach the destination as stored in the topology table.
C. It is the metric that is supplied by the best next hop toward the destination.
D. It is the maximum metric possible based on the maximum hop count that is allowed.
Answer: B
Explanation:
An EIGRP router advertises each destination it can reach as a route with an attached metric. This metric is called the route's reported distance (the term advertised distance has also been used in older documentation). A successor route for any given destination is chosen as having the lowest computed feasible distance; that is, the lowest sum of reported distance plus the cost to get to the advertising router. By default, an EIGRP router will store only the route with the best (lowest) feasible distance in the routing table (or, multiple routes with equivalent feasible distances).
Reference: http://packetlife.net/blog/2010/aug/9/eigrp-feasible-successor-routes/
Q132. Which three modes are valid for forming an EtherChannel between the ports of two switches? (Choose three.)
A. Active/active
B. Active/passive
C. Passive/passive
D. Auto/auto
E. Auto/desirable
F. Desirable/on
Answer: A,B,E
Explanation:
To configure an EtherChannel using LACP negotiation, each side must be set to either active or passive; only interfaces configured in active mode will attempt to negotiate an EtherChannel. Passive interfaces merely respond to LACP requests. PAgP behaves the same, but its two modes are refered to as desirable and auto.
Reference: http://packetlife.net/blog/2010/jan/18/etherchannel-considerations/
Q133. Refer to the exhibit.
Which type of BGP peer is 192.168.1.1?
A. route reflector client
B. iBGP
C. confederation
D. VPNv4
Answer: C
Q134. Which three statements about implementing a NAT application layer gateway in a network are true? (Choose three.)
A. It allows client applications to use dynamic ports to communicate with a server regardless of whether NAT is being used.
B. It maintains granular security over application-specific data.
C. It allows synchronization between multiple streams of data between two hosts.
D. Application layer gateway is used only in VoIP/SIP deployments.
E. Client applications require additional configuration to use an application layer gateway.
F. An application layer gateway inspects only the first 64 bytes of a packet before forwarding it through the network.
Answer: A,B,C
Explanation:
An application-level gateway (ALG), also known as an application-layer gateway, is an application that translates the IP address information inside the payload of an application packet. An ALG is used to interpret the application-layer protocol and perform firewall and Network Address Translation (NAT) actions. These actions can be one or more of the following depending on your configuration of the firewall and NAT:
. Allow client applications to use dynamic TCP or UDP ports to communicate with the server application.
. Recognize application-specific commands and offer granular security control over them.
. Synchronize multiple streams or sessions of data between two hosts that are exchanging data.
. Translate the network-layer address information that is available in the application payload
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_nat/configuration/xe-3s/asr1000/nat-xe-3s-asr1k-book/fw-msrpc-supp.html
Q135. Which IP SLA operation type uses IP to measure the round-trip time between a router and a device?
A. HTTP
B. ICMP Echo
C. ICMP Path Jitter
D. UDP Jitter for VoIP
Answer: B
Avant-garde 400-101 practice exam:
Q136. Which statement about OSPF loop prevention is true?
A. The discard route is generated automatically on the ABR to prevent routing loops.
B. The ASBR uses type 3 LSAs from non-backbone areas to prevent control-plane routing loops.
C. The ABR can filter type 3 LSPs to prevent routing loops.
D. The DN bit ignores LSA types 2, 3, and 5 to prevent routing loops.
Answer: A
Q137. Which regular expression will only allow prefixes that originated from AS 65000 and that are learned through AS 65001?
A. ^65000_65001$
B. 65000_65001$
C. ^65000_65001
D. ^65001_65000$
Answer: D
Explanation:
The following table lists the regular expressions and their meanings:
+------------------------------------------------------+
| CHAR | USAGE |
+------------------------------------------------------|
| ^ | Start of string |
|------|-----------------------------------------------|
| $ | End of string |
|------|-----------------------------------------------|
| [] | Range of characters |
|------|-----------------------------------------------|
| - | Used to specify range ( i.e. [0-9] ) |
|------|-----------------------------------------------|
| ( ) | Logical grouping |
|------|-----------------------------------------------|
| . | Any single character |
|------|-----------------------------------------------|
| * | Zero or more instances |
|------|-----------------------------------------------|
| + | One or more instance |
|------|-----------------------------------------------|
| ? | Zero or one instance |
|------|-----------------------------------------------|
| _ | Comma, open or close brace, open or close |
| | parentheses, start or end of string, or space |
+------------------------------------------------------+
Some commonly used regular expressions include:
+-------------+---------------------------+
| Expression | Meaning |
|-------------+---------------------------|
| .* | Anything |
|-------------+---------------------------|
| ^$ | Locally originated routes |
|-------------+---------------------------|
| ^100_ | Learned from AS 100 |
|-------------+---------------------------|
| _100$ | Originated in AS 100 |
|-------------+---------------------------|
| _100_ | Any instance of AS 100 |
|-------------+---------------------------|
| ^[0-9]+$ | Directly connected ASes |
+-------------+---------------------------+
Reference: http://blog.ine.com/2008/01/06/understanding-bgp-regular-expressions/
Q138. Refer to the exhibit.
Which statement is true about a valid IPv6 address that can be configured on tunnel interface0?
A. There is not enough information to calculate the IPv6 address.
B. 6to4 tunneling allows you to use any IPv6 address.
C. 2001:7DCB:5901::/128 is a valid IPv6 address.
D. 2002:7DCB:5901::/128 is a valid IPv6 address.
Answer: D
Explanation:
Most IPv6 networks use autoconfiguration, which requires the last 64 bits for the host. The first 64 bits are the IPv6 prefix. The first 16 bits of the prefix are always 2002:, the next 32 bits are the IPv4 address, and the last 16 bits of the prefix are available for addressing multiple IPv6 subnets behind the same 6to4 router. Since the IPv6 hosts using autoconfiguration already have determined the unique 64 bit host portion of their address, they must simply wait for a Router Advertisement indicating the first 64 bits of prefix to have a complete IPv6 address. A 6to4 router will know to send an encapsulated packet directly over IPv4 if the first 16 bits are 2002, using the next 32 as the destination, or otherwise send the packet to a well-known relay server, which has access to native IPv6.
Reference: http://en.wikipedia.org/wiki/6to4
Q139. Refer to the exhibit.
Which statement about this GETVPN configuration is true?
A. Co-operative key servers are configured.
B. Redundant peers are configured.
C. The key server uses multicast mode to propagate rekey messages.
D. PSK authentication is configured.
Answer: A
Q140. Refer to the exhibit.
Why is network 172.16.1.0/24 not installed in the routing table?
A. There is no ARP entry for 192.168.1.1.
B. The router cannot ping 192.168.1.1.
C. The neighbor 192.168.1.1 just timed out and BGP will flush this prefix the next time that the BGP scanner runs.
D. There is no route for 192.168.1.1 in the routing table.
Answer: D
Explanation:
Here we see that the next hop IP address to reach the 172.16.1.0 network advertised by the BGP peer is 192.168.1.1. However, the 192.168.1.1 IP is not in the routing table of R3 so it adds the route to the BGP table but marks it as inaccessible, as shown.