Our pass rate is high to 98.9% and the similarity percentage between our passleader 400 101 study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Cisco ccie 400 101 exam in just one try? I am currently studying for the Cisco 400 101 vce exam. Latest Cisco 400 101 pdf Test exam practice questions and answers, Try Cisco 400 101 ccie Brain Dumps First.

Q16. Refer to the exhibit. 

If the downstream router has a summary route configured, which two actions must you take on the local router to create the summary route that summarizes all routes from the downstream router? (Choose two.) 

A. Configure the summary address on the interface. 

B. Use 10.0.0.0 255.248.0.0 as the summary route. 

C. Configure the summary address in the EIGRP process. 

D. Use 10.0.0.0 255.252.0.0 as the summary route. 

E. Configure a route map to permit the route. 

F. Configure a distribute list in. 

Answer: A,B 

Explanation: 

Route summarization works in conjunction with the ip summary-address eigrp interface configuration command, in which additional summarization can be performed. To correctly summarize all the networks shown, the correct route to use is 10.0.0.0 255.248.0.0 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/ip/configuration/guide/fipr_c/1cfeigrp.html 


Q17. Which two options are ways in which an OSPFv3 router handles hello packets with a clear address-family bit? (Choose two.) 

A. IPv4 unicast packets are discarded. 

B. IPv6 unicast packets are discarded. 

C. IPv4 unicast packets are forwarded. 

D. IPv6 unicast packets are forwarded. 

Answer: A,D 

Explanation: 

A typical distance vector protocol saves the following information when computing the best path to a destination: the distance (total metric or distance, such as hop count) and the vector (the next hop). For instance, all the routers in the network in Figure 1 are running Routing Information Protocol (RIP). Router Two chooses the path to Network A by examining the hop count through each available path. 

Since the path through Router Three is three hops, and the path through Router One is two hops, Router Two chooses the path through One and discards the information it learned through Three. If the path between Router One and Network A goes down, Router Two loses all connectivity with this destination until it times out the route of its routing table (three update periods, or 90 seconds), and Router Three re-advertises the route (which occurs every 30 seconds in RIP). Not including any hold-down time, it will take between 90 and 120 seconds for Router Two to switch the path from Router One to Router Three. EIGRP, instead of counting on full periodic updates to re-converge, builds a topology table from each of its neighbor's advertisements (rather than discarding the data), and converges by either looking for a likely loop-free route in the topology table, or, if it knows of no other route, by querying its neighbors. Router Two saves the information it received from both Routers One and Three. It chooses the path through One as its best path (the successor) and the path through Three as a loop-free path (a feasible successor). When the path through Router One becomes unavailable, Router Two examines its topology table and, finding a feasible successor, begins using the path through Three immediately. 

Reference: http://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/16406-eigrp-toc.html 


Q18. What is the range of addresses that is used for IPv4-mapped IPv6 addresses? 

A. 2001. db9. . /32 

B. 2001. db8. . /32 

C. 2002. . /16 

D. . . ffff. /16 

E. . . ffff. 0. 0/96 

Answer:

Explanation: 

IPv4-Mapped Addresses FFFF:0:0/96 are the IPv4-mapped addresses [RFC4291]. Addresses within this block should not appear on the public Internet. 

Reference: https://tools.ietf.org/html/rfc5156 


Q19. Which three options are sub-subfields of the IPv4 Option Type subfield? (Choose three.) 

A. Option Class 

B. GET 

C. Copied 

D. PUSH 

E. Option Number 

F. TTL 

Answer: A,C,E 

Explanation: 

Each IP option has its own subfield format, generally structured as shown below. For most options, all three subfields are used. Option Type, Option Length and Option Data. 

Reference: http://www.tcpipguide.com/free/t_IPDatagramOptionsandOptionFormat.htm 


Q20. Refer to the exhibit. 

This is the configuration of the ASBR of area 110.Which option explains why the remote ABR should not translate the type 7 LSA for the prefix 192.168.0.0/16 into a type 5 LSA? 

A. The remote ABR translates all type 7 LSA into type 5 LSA, regardless of any option configured in the ASBR. 

B. The ASBR sets the forwarding address to 0.0.0.0 which instructs the ABR not to translate the LSA into a type 5 LSA. 

C. The ASBR originates a type 7 LSA with age equal to MAXAGE 3600. 

D. The ABR clears the P bit in the header of the type 7 LSA for 192.168.0.0/16. 

Answer:

Explanation: 

When external routing information is imported into an NSSA, LSA Type 7 is generated by the ASBR and it is flooded within that area only. To further distribute the external information, type 7 LSA is translated into type 5 LSA at the NSSA border. The P-bit in LSA Type 7 field indicates whether the type 7 LSA should be translated. This P-bit is automatically set by the NSSA ABR (also the Forwarding Address (FA) is copied from Type 7 LSA). The P-bit is not set only when the NSSA ASBR and NSSA ABR are the same router for the area. If bit P = 0, then the NSSA ABR must not translate this LSA into Type 5. 

The nssa-only keyword instructs the device to instigate Type-7 LSA with cleared P-bit, thereby, preventing LSA translation to Type 5 on NSSA ABR device. 

Note. If a router is attached to another AS and is also an NSSA ABR, it may originate a both a type-5 and a type-7 LSA for the same network. The type-5 LSA will be flooded to the backbone and the type-7 will be flooded into the NSSA. If this is the case, the P-bit must be reset (P=0) in the type-7 LSA so the type-7 LSA isn’t again translated into a type-5 LSA by another NSSA ABR. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_ospf/configuration/15-e/iro-15-e-book/iro-ospfv3-nssa-cfg.html 


Q21. Refer to the exhibit. 

Notice that debug ip bgp updates have been enabled. What can you conclude from the debug output? 

A. This is the result of the clear ip bgp 10.1.3.4 in command. 

B. This is the result of the clear ip bgp 10.1.3.4 out command. 

C. BGP neighbor 10.1.3.4 performed a graceful restart. 

D. BGP neighbor 10.1.3.4 established a new BGP session. 

Answer:

Explanation: 

If you enter the clear ip bgp out command for a BGP peer, that router resends its BGP prefixes to that peer. This does not cause a change in the best path on the receiving BGP peer. Hence, there is no change in the Table Version on that peer. 

When you run the debug ip bgp updates on the receiving router, you see: 

BGP(0): 10.1.3.4 rcvd UPDATE w/ attr: nexthop 10.1.3.4, origin i, metric 0, merged path 4, AS_PATH 

BGP(0): 10.1.3.4 rcvd 10.100.1.1/32...duplicate ignored 

The received update is recognized as a duplicate, so it is ignored and no best path change occurs. 

Reference: http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/116511-technote-tableversion-00.html 


Q22. What happens when an interface is configured as passive in OSPF? 

A. No OSPF neighbor ship is formed on the interface. 

B. An OSPF neighbor ship is formed with the DR, but not with the BDR. 

C. The subnet configured on the interface is not advertised to any other neighbor. 

D. OSPF hello messages are sent as unicast instead of multicast. 

Answer:


Q23. Which authentication types does OSPF support? 

A. null and clear text 

B. MD5 only 

C. MD5 and clear text 

D. null, clear text, and MD5 

E. clear text only 

Answer:


Q24. Which three statements about VTP version 3 are true? (Choose three.) 

A. It supports other databases in addition to VLAN. 

B. It supports VLANs up to 4095. 

C. It supports the synchronization of switch configuration templates between switches in the domain. 

D. It supports the transfer of information about private VLAN structures. 

E. It supports the transfer of PVST+ configuration information. 

F. It supports RSTP. 

Answer: A,B,D 

Explanation: 

Much work has gone into improving the usability of VTP version 3 in three major areas: 

. The new version of VTP offers better administrative control over which device is allowed to update other devices' view of the VLAN topology. The chance of unintended and disruptive changes is significantly reduced, and availability is increased. The reduced risk of unintended changes will ease the change process and help speed deployment. 

. Functionality for the VLAN environment has been significantly expanded. Two enhancements are most beneficial for today's networks: 

– In addition to supporting the earlier ISL VLAN range from 1 to 1001, the new version supports the whole IEEE 802.1Q VLAN range up to 4095. 

– In addition to supporting the concept of normal VLANs, VTP version 3 can transfer information regarding Private VLAN (PVLAN) structures. 

. The third area of major improvement is support for databases other than VLAN (for example, MST). 

Reference: http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-series-switches/solution_guide_c78_508010.html 


Q25. Which two statements about IPsec VTI implementation are true? (Choose two.) 

A. The IKE SA can be bound to the VTI and the crypto map. 

B. The transform set can be configured only in tunnel mode. 

C. SVTIs support only a single IPsec SA. 

D. SVTIs support IPv4 packets that carry IPv6 packets. 

Answer: B,C 


Q26. What is the goal of Unicast Reverse Path Forwarding? 

A. to verify the reachability of the destination address in forwarded packets 

B. to help control network congestion 

C. to verify the reachability of the destination address in multicast packets 

D. to verify the reachability of the source address in forwarded packets 

Answer:

Explanation: 

Network administrators can use Unicast Reverse Path Forwarding (Unicast RPF) to help limit the malicious traffic on an enterprise network. This security feature works by enabling a router to verify the reachability of the source address in packets being forwarded. This capability can limit the appearance of spoofed addresses on a network. If the source IP address is not valid, the packet is discarded. 

Reference: http://www.cisco.com/web/about/security/intelligence/unicast-rpf.html 


Q27. Which three address family types does EIGRP support? (Choose three.) 

A. IPv4 unicast 

B. IPv4 multicast 

C. IPv6 unicast 

D. IPv6 multicast 

E. IPv4 anycast 

F. IPv6 anycast 

Answer: A,B,C 


Q28. Refer to the exhibit. 

While troubleshooting high CPU utilization of a Cisco Catalyst 4500 Series Switch, you notice the error message that is shown in the exhibit in the log file. 

What can be the cause of this issue, and how can it be prevented? 

A. The hardware routing table is full. Redistribute from BGP into IGP. 

B. The software routing table is full. Redistribute from BGP into IGP. 

C. The hardware routing table is full. Reduce the number of routes in the routing table. 

D. The software routing table is full. Reduce the number of routes in the routing table. 

Answer:

Explanation: 

L3HWFORWADING-2 

Error MessageC4K_L3HWFORWARDING-2-FWDCAMFULL:L3 routing table is full. 

Switching to software forwarding. 

The hardware routing table is full; forwarding takes place in the software instead. The switch performance might be degraded. 

Recommended Action: Reduce the size of the routing table. Enter the ip cef command to return to hardware forwarding. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/31sg/system/message/message/emsg.html 


Q29. Which two statements about route summarization are true? (Choose two.)

A. RIP, IGRP, and EIGRP can automatically summarize routing information at network address boundaries. 

B. EIGRP can automatically summarize external routes. 

C. The area range command can aggregate addresses on the ASBR. 

D. The summary-address command under the router process configures manual summarization on RIPv2 devices. 

E. The ip classless command enables classful protocols to select a default route to an unknown subnet on a network with other known subnets. 

Answer: A,E 


Q30. Which two options are benefits of EIGRP OTP? (Choose two.) 

A. It allows EIGRP routers to peer across a service provider without the service provider involvement. 

B. It allows the customer EIGRP domain to remain contiguous. 

C. It requires only minimal support from the service provider. 

D. It allows EIGRP neighbors to be discovered dynamically. 

E. It fully supports multicast traffic. 

F. It allows the administrator to use different autonomous system numbers per EIGRP domain. 

Answer: A,B 

Explanation: 

EIGRP Over the Top (OTP) allows EIGRP routers to peer across a service provider infrastructure without the SP’s involvement. In fact with OTP, the provider won’t see customer routes at all. EIGRP OTP acts as a provider-independent overlay that transports customer data between the customer’s routers. To the customer, the EIGRP domain is contiguous. A customer’s EIGRP router sits at the edge of the provider cloud, and peers with another EIGRP router a different location across the cloud. Learned routes feature a next hop of the customer router — not the provider. Good news for service providers is that customers can deploy EIGRP OTP with their involvement 

Reference: http://ethancbanks.com/2013/08/01/an-overview-of-eigrp-over-the-top-otp/