The Cisco 400-101 audit could be used up in Speech. One could be capable to enhance the shape the future just after growing the following analyze. The exam includes a advanced of issue and so the test takers have got to commit enough amount of time in audit preparation. There are numerous 400-101 investigation publications that makes the audit preparation better. Most of these would probably include many 400-101 questions which would contain thorough reason for all the questions. As a result a prospects could well be presented an excellent type of the patient subject. There are numerous Cisco 400-101 investigation substances already in the market and so a prospects has to be wary ample to find the correct investigation product.

2017 Mar 400-101 book

Q21. Which authentication method does OSPFv3 use to secure communication between neighbors? 

A. plaintext 



D. IPSec 



In order to ensure that OSPFv3 packets are not altered and re-sent to the device, causing the device to behave in a way not desired by its system administrators, OSPFv3 packets must be authenticated. OSPFv3 uses the IPsec secure socket API to add authentication to OSPFv3 packets. This API supports IPv6. OSPFv3 requires the use of IPsec to enable authentication. Crypto images are required to use authentication, because only crypto images include the IPsec API needed for use with OSPFv3. 


Q22. What is the main component of Unified MPLS? 

A. Multiple IGPs in the network are used, where the loopback IP addresses of the PE routers are aggregated on the area border routers. 

B. Confederations are used to provide scalability. 

C. The loopback prefixes from one IGP area are redistributed into BGP without changing the next hop. 

D. The ABR is a BGP route reflector and sets next-hop to self for all reflected routes. 



Since the core and aggregation parts of the network are integrated and end-to-end LSPs are provided, the Unified MPLS solution is also referred to as "Seamless MPLS." New technologies or protocols are not used here, only MPLS, Label Distribution Protocol (LDP), IGP, and BGP. Since you do not want to distribute the loopback prefixes of the PE routers from one part of the network into another part, you need to carry the prefixes in BGP. The Internal Border Gateway Protocol (iBGP) is used in one network, so the next hop address of the prefixes is the loopback prefixes of the PE routers, which is not known by the IGP in the other parts of the network. This means that the next hop address cannot be used to recurse to an IGP prefix. The trick is to make the ABR routers Route Reflectors (RR) and set the next hop to self, even for the reflected iBGP prefixes. In order for this to work, a new knob is needed. 


Q23. Refer to the exhibit. 

NHRP registration is failing; what might be the problem? 

A. invalid IP addressing 

B. fragmentation 

C. incorrect NHRP mapping 

D. incorrect NHRP authentication 



Configuring an authentication string ensures that only routers configured with the same string can communicate using NHRP. Therefore, if the authentication scheme is to be used, the same string must be configured in all devices configured for NHRP on a fabric 

Reference: p1055432 

Q24. Which two statements about SNMP are true? (Choose two.) 

A. SNMPv3 provides privacy and access control. 

B. All SNMP versions use get, getNext, and getBulk operations. 

C. SNMPv3 uses encrypted community strings. 

D. SNMPv1 and SNMPv2c use plaintext community strings. 

E. All SNMP versions support bulk retrieval and detailed error messages. 

Answer: A,B 

Q25. Which IP SLA operation type uses IP to measure the round-trip time between a router and a device? 


B. ICMP Echo 

C. ICMP Path Jitter 

D. UDP Jitter for VoIP 


Latest 400-101 practice question:

Q26. Which statement about OSPF loop prevention is true? 

A. The discard route is generated automatically on the ABR to prevent routing loops. 

B. The ASBR uses type 3 LSAs from non-backbone areas to prevent control-plane routing loops. 

C. The ABR can filter type 3 LSPs to prevent routing loops. 

D. The DN bit ignores LSA types 2, 3, and 5 to prevent routing loops. 


Q27. Which two options are EEM policies? (Choose two.) 

A. applets 

B. event detectors 

C. scripts 

D. syslogs 

E. actions 

Answer: A,C 

Q28. Refer to the exhibit. 

Which two statements about the R1 configuration are true? (Choose two.) 

A. The IP TTL value is copied to the MPLS field during label imposition. 

B. The structure of the MLPS network is hidden in a traceroute. 

C. The LDP session interval and hold times are configured for directly connected neighbors. 

D. R1 protects the session for 86400 seconds. 

E. All locally assigned labels are discarded. 

Answer: B,D 

Q29. Which BGP feature enables you to install a backup path in the forwarding table? 

A. soft reconfiguration 

B. prefix independent convergence 

C. route refresh 

D. synchronization 



To install a backup path into the forwarding table and provide prefix independent convergence (PIC) in case of a PE-CE link failure, use the additional-paths install backup command in an appropriate address family configuration mode. To prevent installing the backup path, use the no form of this command. To disable prefix independent convergence, use the disable keyword. 


Q30. Which two statements about SNMP traps are true? (Choose two.) 

A. They are sent by an agent after a specified event. 

B. They are sent when solicited after a specified event. 

C. They are equivalent to a community string. 

D. They provide solicited data to the manager. 

E. They are sent by a management station to an agent. 

F. Vendor-specific traps can be configured. 

Answer: A,F 


The SNMP agent contains MIB variables whose values the SNMP manager can request or change. A manager can get a value from an agent or store a value into the agent. The agent gathers data from the MIB, the repository for information about device parameters and network data. The agent can also respond to a manager's requests to get or set data. An agent can send unsolicited traps to the manager. Traps are messages alerting the SNMP manager to a condition on the network. Traps can mean improper user authentication, restarts, link status (up or down), MAC address tracking, closing of a TCP connection, loss of connection to a neighbor, or other significant events.