Ensurepass
2017 May Cisco Official New Released 400-101 Q&As
100% Free Download! 100% Pass Guaranteed!
http://www.ensurepass.com/400-101.html
CCIE Routing and Switching Written Exam v5.1
QUESTION 201
You are backing up a server with a 1 Gbps link and a latency of 2 ms. Which two statements about the backup are true? (Choose two.)
A. |
The bandwidth delay product is 2 Mb. |
B. |
The default TCP send window size is the limiting factor. |
C. |
The default TCP receive window size is the limiting factor. |
D. |
The bandwidth delay product is 500 Mb. |
E. |
The bandwidth delay product is 50 Mb. |
Correct Answer: AC
Explanation:
1 Gbps is the same as 1000 Mbps, and 1000Mb x .0002 = 2 Mbps. With TCP based data transfers, the receive window is always the limiting factor, as the sender is generally able to send traffic at line rate, but then must wait for the acknowledgements to send more data.
QUESTION 202
Which neighbor-discovery message type is used to verify connectivity to a neighbor when the link-layer address of the neighbor is known?
A. |
neighbor solicitation |
B. |
neighbor advertisement |
C. |
router advertisement |
D. |
router solicitation |
Correct Answer: A
Explanation:
IPv6 Neighbor Solicitation Message
A value of 135 in the Type field of the ICMP packet header identifies a neighbor solicitation message. Neighbor solicitation messages are sent on the local link when a node wants to determine the link-layer address of another node on the same local link (see the figure below). When a node wants to determine the link-layer address of another node, the source address in a neighbor solicitation message is the IPv6 address of the node sending the neighbor solicitation message. The destination address in the neighbor solicitation message is the solicited-node multicast address that corresponds to the IPv6 address of the destination node. The neighbor solicitation message also includes the link-layer address of the source node.
Figure 1. IPv6 Neighbor Discovery: Neighbor Solicitation Message
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_basic/configuration/xe-3s/ip6b-xe-3s-book/ip6-neighb-disc-xe.html
QUESTION 203
Refer to the exhibit. If the traffic flowing from network 192.168.254.0 to 172.16.250.0 is unencrypted, which two actions must you take to enable encryption? (Choose two).
A. |
Configure the transform-set on R2 to match the configuration on R1. |
B. |
Configure the crypto map on R2 to include the correct subnet. |
C. |
Configure the ISAKMP policy names to match on R1 and R2. |
D. |
Configure the crypto map names to match on R1 and R2. |
E. |
Configure the Diffie-Hellman keys used in the ISAKMP policies to be different on R1 and R2. |
Correct Answer: AB
Explanation:
A transform set combines an encryption method and an authentication method. During the IPsec security association negotiation with ISAKMP, the peers agree to use a particular transform set to protect a particular data flow. The transform set must be the same for both peers. Also, the crypto map on R2 points to the address name of VPN, which includes 172.16.0.0/16, but it should be the local subnet of 192.168.0.0/16.
QUESTION 204
Refer to the exhibit. Router 1 and Router 2 use HSRP to provide first hop redundancy for hosts on the 10.1.2.0/24 network. Which feature can provide additional failover coverage for the PC?
A. |
Cisco Express Forwarding |
B. |
NetFlow |
C. |
Accounting |
D. |
Enhanced Object Tracking |
Correct Answer: D
Explanation:
HSRP has a mechanism for tracking the interface line-protocol state. The enhanced object tracking feature separates the tracking mechanism from HSRP. It creates a separate, standalone tracking process that can be used by processes other than HSRP. This feature allows tracking of other objects in addition to the interface line-protocol state. A client process, such as HSRP, can register an interest in tracking objects and request notification when the tracked object changes state. Several clients can track the same object, and can take different actions when the object changes state. This feature increases the availability and speed of recovery of a router system and decreases outages and outage duration
Reference: http://www.cisco.com/c/en/us/td/docs/switches/blades/3040/software/release/12-2_44_se/configuration/guide/swhsrp.html#wp1083927
QUESTION 205
What is the ip dhcp snooping information option command used for?
A. |
It displays information about the DHCP snooping table. |
B. |
It sends a syslog and an SNMP trap for a DHCP snooping violation. |
C. |
It enables the DHCP snooping host tracking feature. |
D. |
It enables DHCP option 82 data insertion. |
Correct Answer: D
Explanation:
To enable DHCP option-82 data insertion, perform this task:
Command
Purpose
Step 1
Router(config)# ip dhcp snooping information option
Enables DHCP option-82 data insertion.
Step 2
Router(config)# ip dhcp snooping information option replace
Or:
Router(config-if)# ip dhcp snooping information option replace
(Optional) Replaces the DHCP relay information option received in snooped packets with the switch’s option-82 data.
Step 3
Router(config)# do show ip dhcp snooping | include 82
Verifies
Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12- 2SX/configuration/guide/book/snoodhcp.html
QUESTION 206
Which two Cisco Express Forwarding tables are located in the data plane? (Choose two.)
A. |
the forwarding information base |
B. |
the label forwarding information base |
C. |
the IP routing table |
D. |
the label information table |
E. |
the adjacency table |
Correct Answer: AB
Explanation:
The control plane runs protocols such as OSPF, BGP, STP, LDP. These protocols are needed so that routers and switches know how to forward packets and frames. The data plane is where the actual forwarding takes place. The data plane is populated based on the protocols running in the control plane. The Forwarding Information Base (FIB) is used for IP traffic and the Label FIB is used for MPLS.
QUESTION 207
Which two statements about the metric-style wide statement as it applies to route redistribution are true? (Choose two.)
A. |
It is used in IS-IS. |
B. |
It is used in OSPF. |
C. |
It is used in EIGRP. |
D. |
It is used for accepting TLV. |
E. |
It is used in PIM for accepting mroutes. |
F. |
It is used for accepting external routes. |
Correct Answer: AD
Explanation:
To configure a router running IS-IS to generate and accept only new-style TLVs (TLV stands for type, length, and value object), use the metric-style wide command.
Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/TE_1208S.html#wp49409
QUESTION 208
Refer to the exhibit. All switches have default bridge priorities, and originate BPDUs with MAC addresses as indicated. The numbers shown are STP link metrics. After STP converges, you discover that traffic from switch SWG toward switch SWD takes a less optimal path. What can you do to optimize the STP tree in this switched network?
A. |
Change the priority of switch SWA to a lower value than the default value. |
B. |
Change the priority of switch SWB to a higher value than the default value. |
C. |
Change the priority of switch SWG to a higher value than the default value. |
D. |
Change the priority of switch SWD to a lower value than the default value. |
Correct Answer: D
Explanation:
In this topology, we see that all port paths and priorities are the same, so the lowest MAC address will be used to determine the best STP path. From SWG, SWE will be chosen as the next switch in the path because it has a lower MAC address than SWF. From SWE, traffic will go to SWC because it has a lower MAC address, and then to SWD, instead of going from SWE directly to SWD. If we lower the priority of SWD (lower means better with STP) then traffic will be sent directly to SWD.
QUESTION 209
Refer to the exhibit. Which statement describes what the authoritative flag indicates?
A. |
Authentication was used for the mapping. |
B. |
R1 learned about the NHRP mapping from a registration request. |
C. |
Duplicate mapping in the NHRP cache is prevented. |
D. |
The registration request had the same flag set. |
Correct Answer: B
Explanation:
Show NHRP:
Examples:
The following is sample output from the show ip nhrp command:
Router# show ip nhrp
10.0.0.2 255.255.255.255, tunnel 100 created 0:00:43 expire 1:59:16
Type. dynamic Flags: authoritative
NBMA address: 10.1111.1111.1111.1111.1111.1111.1111.1111.1111.11
10.0.0.1 255.255.255.255, Tunnel0 created 0:10:03 expire 1:49:56
Type. static Flags: authoritative
The fields in the sample display are as follows:
Flags:
authoritative–Indicates that the NHRP information was obtained from the Next Hop Server or router that maintains the NBMA-to-IP address mapping for a particular destination.
Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_4/ip_addr/configuration/guide/hadnhrp.html
QUESTION 210
Which type of OSPF packet is an OSPF link state update packet?
A. |
type 1 |
B. |
type 2 |
C. |
type 3 |
D. |
type 4 |
E. |
type 5 |
Correct Answer: D
Explanation:
Link State Update packets are OSPF packet type 4. These packets implement the flooding of link state advertisements. Each Link State Update packet carries a collection of link state advertisements one hop further from its origin. Several link state advertisements may be included in a single packet.
Reference: http://www.freesoft.org/CIE/RFC/1583/107.htm
100% Free Download!
—Download Free Demo:400-101 Demo PDF
100% Pass Guaranteed!
—Download 2017 Ensurepass 400-101 Full Exam PDF and VCE Q&As:1273
—Get 10% off your purchase! Copy it:TJDN-947R-9CCD [2017.05.01-2017.05.31]
Ensurepass | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF + VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |
2017 Ensurepass IT Certification PDF and VCE
100-105 Dumps VCE PDF
200-105 Dumps VCE PDF
300-101 Dumps VCE PDF
300-115 Dumps VCE PDF
300-135 Dumps VCE PDF
300-320 Dumps VCE PDF
400-101 Dumps VCE PDF
640-911 Dumps VCE PDF
640-916 Dumps VCE PDF
70-410 Dumps VCE PDF
70-411 Dumps VCE PDF
70-412 Dumps VCE PDF
70-413 Dumps VCE PDF
70-414 Dumps VCE PDF
70-417 Dumps VCE PDF
70-461 Dumps VCE PDF
70-462 Dumps VCE PDF
70-463 Dumps VCE PDF
70-464 Dumps VCE PDF
70-465 Dumps VCE PDF
70-480 Dumps VCE PDF
70-483 Dumps VCE PDF
70-486 Dumps VCE PDF
70-487 Dumps VCE PDF
220-901 Dumps VCE PDF
220-902 Dumps VCE PDF
N10-006 Dumps VCE PDF
SY0-401 Dumps VCE PDF