Cisco 400-101 audit is probably the best qualifications from Cisco thus their competitors is very. However for Cisco, your skills and also prospective can get the best escape and also 400-101 is a excellent way to this. Encountered the fiercer and also fiercer competitors in buying it globe, are you feeling excellent tension? However, you need to do. And then you?¡¥d much better purchase the Cisco to take your job. Currently, A growing number of Them Qualification are appear currently being to in our life. Like Cisco 400-101 Recognition. Wait, how to sign up for this official certifications? Exambible offers you respond to.
2017 Apr 400-101 actual exam
Q351. In which 802.1D port state are the root bridge, the root port, and the designated port(s) elected?
STP switch port states:
. Blocking – A port that would cause a switching loop if it were active. No user data is sent or received over a blocking port, but it may go into forwarding mode if the other links in use fail and the spanning tree algorithm determines the port may transition to the forwarding state. BPDU data is still received in blocking state. Prevents the use of looped paths.
. Listening – The switch processes BPDUs and awaits possible new information that would cause it to return to the blocking state. It does not populate the MAC address table and it does not forward frames. In this state the root bridge, the root port, and the designated port(s) are elected.
. Learning – While the port does not yet forward frames it does learn source addresses from frames received and adds them to the filtering database (switching database). It populates the MAC Address table, but does not forward frames.
. Forwarding – A port receiving and sending data, normal operation. STP still monitors incoming BPDUs that would indicate it should return to the blocking state to prevent a loop.
. Disabled – Not strictly part of STP, a network administrator can manually disable a port.
Q352. Which mechanism does Cisco recommend for CE router interfaces that face the service provider for an EVPL circuit with multiple EVCs and multiple traffic classes?
C. tail drop
In a simple handoff, packets may be discarded in the service provider network, either because of congestion on a link without an appropriate QoS policy or because of a policer QoS configuration on the service provider network that serves to rate limit traffic accessing the WAN core. To address these issues, QoS on the CE device is applied at a per-port level. A QoS service policy is configured on the outside Ethernet interface, and this parent policy includes a shaper that then references a second or subordinate (child) policy that enables queueing within the shaped rate. This is called a hierarchical CBWFQ (HCBWFQ) configuration.
Reference: http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/WAN_and_MAN/Ethernet_Acces s_for_NG_MAN_WAN_V3-1_external.html
Q353. Which attribute is transported over an MPLS VPN as a BGP extended community?
A. route target
B. route distinguisher
E. local preference
Q354. Which two statements about path selection are true? (Choose two.)
A. If there are multiple equal matches between OSPF processes, the path with the lowest OSPF PID is chosen.
B. If the backdoor command is configured on a BGP network, the route is advertised with an AD of 20.
C. If an OSPF E2 route has an AS of 90, that path is preferred over an OSPF IA route with an AD of 110.
D. If there are multiple equal matches between the same protocols on an EIGRP network, the preferred path will be EIGRP with the highest AS.
E. If IS-IS has multiple routes with the same prefix-length, it will prefer Level 1 routes over Level 2 routes.
Q355. Which statement about NAT64 is true?
A. It uses one-to-one mapping between IPv6 addresses and IPv4 addresses.
B. It requires static address mapping between IPv6 addresses and IPv4 addresses.
C. It can be used to translate an IPv6 network to another IPv6 network.
D. It can be configured for stateless and stateful translation.
Renew 400-101 free question:
Q356. When the BGP additional-paths feature is used, what allows a BGP speaker to differentiate between the different available paths?
A. The remote BGP peer prepends its own next-hop address to the prefix.
B. A unique path identifier is encoded into a dedicated field to the NLRI.
C. A route distinguisher is appended to the prefix by the receiving BGP speaker.
D. The additional path information is encoded in an extended community.
Q357. Refer to the exhibit.
Which technology can be used on the switch to enable host A to receive multicast packets for 18.104.22.168 but prevent host B from receiving them?
A. IGMP filtering
B. MLD snooping
C. IGMP snooping
D. MLD filtering
IGMP snooping is the process of listening to Internet Group Management Protocol (IGMP) network traffic. The feature allows a network switch to listen in on the IGMP conversation between hosts and routers. By listening to these conversations the switch maintains a map of which links need which IP multicast streams. Multicasts may be filtered from the links which do not need them and thus controls which ports receive specific multicast traffic.
Q358. Which technology can be used to secure the core of an STP domain?
B. BPDU guard
C. BPDU filter
D. root guard
Since STP does not implement any authentication or encryption to protect the exchange of BPDUs, it is vulnerable to unauthorized participation and attacks. Cisco IOS offers the STP Root Guard feature to enforce the placement of the root bridge and secure the core of the STP domain.
STP root guard forces a port to become a designated port so that no switch on the other end of the link can become a root switch. If a port configured for root guard receives a superior BPDU, the port it is received on is blocked. In this way, STP root guard blocks other devices from trying to become the root bridge.
STP root guard should be enabled on all ports that will never connect to a root bridge, for example, all end user ports. This ensures that a root bridge will never be negotiated on those ports.
Reference: http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/Baseline_Security/secur ebasebook/sec_chap7.html
Q359. Refer to the exhibit.
When the link between RtrB and RtrC goes down, multicast receivers stop receiving traffic from the source for multicast group 22.214.171.124.Which solution will resolve this?
A. adding a static mroute on RtrB and RtrF
B. adding a static unicast route on RtrB and RtrF
C. creating a GRE tunnel between RtrB and RtrD
D. enabling PIM sparse mode on both ends of the link between RtrB and RtrF
For multicast traffic to flow, PIM must be enabled on all routers in the path of the multicast stream.
Q360. Refer to the exhibit.
Which two configuration changes enable the user admin to log in to the device? (Choose two.)
A. Configure the login authentication to be case-insensitive.
B. Configure the user admin with a password and appropriate privileges.
C. Configure the login authentication to be case-sensitive.
D. Modify the configuration to use a named group.
E. Configure additional login authentication under the terminal lines.
Usernames and passwords are case-sensitive. Users attempting to log in with an incorrectly cased username or password will be rejected. If users are unable to log into the router with their specific passwords, reconfigure the username and password on the router.