Cause all that matters here is passing the Cisco 400-101 exam. Cause all that you need is a high score of 400-101 CCIE Routing and Switching (v5.0) exam. The only one thing you need to do is downloading Pass4sure 400-101 exam study guides now. We will not let you down with our money-back guarantee.

2017 Mar 400-101 test preparation

Q291. Which two statements are characteristics of Ethernet private LAN circuits? (Choose two.) 

A. They support communication between two or more customer endpoints. 

B. They utilize more than one bridge domain. 

C. They support point-to-multipoint EVC. 

D. They support multipoint-to-multipoint EVC. 

Answer: A,D 


An Ethernet Private LAN (EPLAN) is a multipoint–to–multipoint EVC. EPLAN is an EVC that supports communication between two or more UNIs. In EPLAN, only one EVC can exist on a port and the port can have only one EFP. 

Reference: ion/cpt93_configuration_chapter_0100.pdf 

Q292. Refer to the exhibit. 

Which part of the joined group addresses list indicates that the interface has joined the EIGRP multicast group address? 

A. FF02::1 

B. FF02::1:FF00:200 

C. FF02::A 

D. FF02::2 



FF02::A is an IPv6 link-local scope multicast addresses. This address is for all devices on a wire that want to "talk" EIGRP with one another. 

Focusing specifically on FF02::A and how routers join it, we can see and say three things: 

. Local: FF02::A is local to the wire. 

. Join: Each device "joins" FF02::A by just "deciding to listen" to the IPv6 link-local scope multicast address FF02::A. Then, by extension, it listens to the corresponding MAC address for that multicast IPv6 address (33:33:00:00:00:0A). 

. Common interest: As we can see, these varying groups have something in common that they would all like to hear about. For FF02::A, the common interest --the "connection" among the devices joining that group – is that they all want to listen to or participate in EIGRP. 


Q293. Which two statements about the default behavior of IS-IS are true? (Choose two.) 

A. The default IS-IS router type is L1/L2. 

B. The default IS-IS metric type is wide. 

C. The default IS-IS interface circuit type is L1/L2. 

D. By default, two IS-IS routers must use the same hello interval and hold timer in order to become neighbors. 

Answer: A,C 

Q294. Refer to the exhibit. 

Which two are causes of output queue drops on FastEthernet0/0? (Choose two.) 

A. an oversubscribed input service policy on FastEthernet0/0 

B. a duplex mismatch on FastEthernet0/0 

C. a bad cable connected to FastEthernet0/0 

D. an oversubscribed output service policy on FastEthernet0/0 

E. The router trying to send more than 100 Mb/s out of FastEthernet0/0 

Answer: D,E 


Output drops are caused by a congested interface. For example, the traffic rate on the outgoing interface cannot accept all packets that should be sent out, or a service policy is applied that is oversubscribed. The ultimate solution to resolve the problem is to increase the line speed. However, there are ways to prevent, decrease, or control output drops when you do not want to increase the line speed. You can prevent output drops only if output drops are a consequence of short bursts of data. If output drops are caused by a constant high-rate flow, you cannot prevent the drops. However, you can control them. 


Q295. While troubleshooting an issue for a remote user, you must capture the communication between the user's computer and a server at your location. The traffic passes through a Cisco IOS-XE capable switch. Which statement about obtaining the capture is true? 

A. The Embedded Packet Capture application in the IOS-XE Software can capture the packets, but there is a performance impact. 

B. The Embedded Packet Capture application in the IOS-XE Software can capture the packets without impacting performance. 

C. The Mini Protocol Analyzer embedded in the IOS-XE Software can capture the packets without impacting performance. 

D. The Mini Protocol Analyzer embedded in the IOS-XE Software can be used to capture the packets, but there is a performance impact. 

E. Wireshark can capture packets through a SPAN port, but there is a performance impact. 


Updated 400-101 test engine:


Drag and drop the VLAN number on the left to the corresponding default VLAN name on the right. 


Q297. Which service is disabled by the no service tcp-small-servers command? 

A. the finger service 

B. the Telnet service 

C. the Maintenance Operation Protocol service 

D. the chargen service 



The TCP small servers are: . Echo: Echoes back whatever you type through the telnet x.x.x.x echo command. 

. Chargen: Generates a stream of ASCII data. Use the telnet x.x.x.x chargen Command.

 . DiscarD. Throws away whatever you type. Use the telnet x.x.x.x discard command. 

. DaytimE. Returns system date and time, if it is correct. It is correct if you run Network Time Protocol (NTP), or have set the date and time manually from the exec level. Use the telnet x.x.x.x daytime command. 


Q298. Which three components comprise the structure of a pseudowire FEC element? (Choose three.) 

A. pseudowire ID 

B. pseudowire type 

C. control word 

D. Layer 3 PDU 

E. header checksum 

F. type of service 

Answer: A,B,C 


The Pseudowire ID FEC element has the following components: 

. Pseudowire ID FEC — The first octet has a value of 128 that identifies it as a Pseudowire ID FEC element. 

. Control Word Bit (C-Bit) — The C-bit indicates whether the advertising PE expects the control word to be present for pseudowire packets. A control word is an optional 4-byte field located between the MPLS label stack and the Layer 2 payload in the pseudowire packet. The control word carries generic and Layer 2 payload-specific information. If the C-bit is set to 1, the advertising PE expects the control word to be present in every pseudowire packet on the pseudowire that is being signaled. If the C-bit is set to 0, no control word is expected to be present. 

. Pseudowire Type — PW Type is a 15-bit field that represents the type of pseudowire. Examples of pseudowire types are shown in Table 6-1. 

. Pseudowire Information Length — Pseudowire Information Length is the length of the Pseudowire ID field and the interface parameters in octets. When the length is set to 0, this FEC element stands for all pseudowires using the specified Group ID. The Pseudowire ID and Interface Parameters fields are not present. 

. Group ID — The Group ID field is a 32-bit arbitrary value that is assigned to a group of pseudowires. 

. Pseudowire ID — The Pseudowire ID, also known as VC ID, is a non-zero, 32-bit identifier that distinguishes one pseudowire from another. To connect two attachment circuits through a pseudowire, you need to associate each one with the same Pseudowire ID. 

. Interface Parameters — The variable-length Interface Parameters field provides attachment circuit-specific information, such as interface MTU, maximum number of concatenated ATM cells, interface description, and so on. 


Q299. Which two options are ways in which an OSPFv3 router handles hello packets with a clear address-family bit? (Choose two.) 

A. IPv4 unicast packets are discarded. 

B. IPv6 unicast packets are discarded. 

C. IPv4 unicast packets are forwarded. 

D. IPv6 unicast packets are forwarded. 

Answer: A,D 


A typical distance vector protocol saves the following information when computing the best path to a destination: the distance (total metric or distance, such as hop count) and the vector (the next hop). For instance, all the routers in the network in Figure 1 are running Routing Information Protocol (RIP). Router Two chooses the path to Network A by examining the hop count through each available path. 

Since the path through Router Three is three hops, and the path through Router One is two hops, Router Two chooses the path through One and discards the information it learned through Three. If the path between Router One and Network A goes down, Router Two loses all connectivity with this destination until it times out the route of its routing table (three update periods, or 90 seconds), and Router Three re-advertises the route (which occurs every 30 seconds in RIP). Not including any hold-down time, it will take between 90 and 120 seconds for Router Two to switch the path from Router One to Router Three. EIGRP, instead of counting on full periodic updates to re-converge, builds a topology table from each of its neighbor's advertisements (rather than discarding the data), and converges by either looking for a likely loop-free route in the topology table, or, if it knows of no other route, by querying its neighbors. Router Two saves the information it received from both Routers One and Three. It chooses the path through One as its best path (the successor) and the path through Three as a loop-free path (a feasible successor). When the path through Router One becomes unavailable, Router Two examines its topology table and, finding a feasible successor, begins using the path through Three immediately. 


Q300. Which statement about the BGP scope of the cost community is true? 

A. It is shared with IBGP neighbors only. 

B. It is shared with IBGP neighbors and route reflectors. 

C. It is shared with EBGP neighbors only. 

D. It is shared with IBGP and EBGP neighbors. 

E. It is shared with IBGP and confederation peers. 



The BGP Cost Community feature introduces the cost extended community attribute. The cost community is a non-transitive extended community attribute that is passed to internal BGP (iBGP) and confederation peers but not to external BGP (eBGP) peers. The cost community feature allows you to customize the local route preference and influence the best path selection process by assigning cost values to specific routes.