There exists a quite normal myth concerning the Cisco 400-101 review qualification that its a extremely hard sort of qualification for being reached. Nevertheless this is a totally fake concept. It merely requires the proper 400-101 examine fabric and will also be along when it comes to results. Even if there are several internet sites in which carry out it might be, but the majority of them are possibly fraudulent or perhaps out of date. Consequently, be extremely careful also very important as part of your choice of the website.

2017 Apr 400-101 exam question

Q471. DRAG DROP 

Drag and drop the path-selection criteria on the left into the correct route-selection order on the right, that a router will use when having multiple routes toward the same destination. 

Answer: 


Q472. Which two statements about the default SNMP configuration are true? (Choose two.) 

A. The SNMP agent is enabled. 

B. The SNMP trap receiver is configured. 

C. All SNMP notification types are sent. 

D. SNMPv1 is the default version. 

E. SNMPv3 is the default version. 

Answer: C,D 

Explanation: 

Default SNMP Configuration 

Feature 

Default Setting 

SNMP agent 

Enabled SNMP community strings 

Read-Only: Public 

Read-WritE. Private 

Read-Write-all: Secret 

SNMP trap receiver 

None configured 

SNMP traps 

None enabled 

SNMP version 

If no version keyword is present, the default is version 1. 

SNMPv3 authentication 

If no keyword is entered, the default is the noauth (noAuthNoPriv) security level. 

SNMP notification type 

If no type is specified, all notifications are sent. 

Reference: 

http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2950/software/release/12-1_19_ea1/configuration/guide/2950scg/swsnmp.html 


Q473. What is the preferred method to improve neighbor loss detection in EIGRP? 

A. EIGRP natively detects neighbor down immediately, and no additional feature or configuration is required. 

B. BFD should be used on interfaces that support it for rapid neighbor loss detection. 

C. Fast hellos (subsecond) are preferred for EIGRP, so that it learns rapidly through its own mechanisms. 

D. Fast hellos (one-second hellos) are preferred for EIGRP, so that it learns rapidly through its own mechanisms. 

Answer:

Explanation: 

Bi-directional Forwarding Detection (BFD) provides rapid failure detection times between forwarding engines, while maintaining low overhead. It also provides a single, standardized method of link/device/protocol failure detection at any protocol layer and over any media. 

Reference: “Bidirectional Forwarding Detection for EIGRP” 

http://www.cisco.com/en/US/technologies/tk648/tk365/tk207/technologies_white_paper090 0aecd80243fe7.html 


Q474. What is the destination multicast MAC address for BPDUs on the native VLAN, for a switch that is running 802.1D? 

A. 0185. C400. 0000 

B. 0100.0CCC.CCCC 

C. 0100.0CCC.CCCD 

D. 0180.C200.0000 

Answer:

Explanation: 

If the native vlan is 1: 

A STP BPDU for VLAN 1 will be sent untagged to MAC 0180.c200.0000 (this is the 

common spanning tree) 

A PVST+ BPDU for VLAN 1 will be sent untagged to MAC 0100.0ccc.cccd 

A PVST+ BPDU for all other vlans will be sent with a 802.1Q tag to MAC 0100.0ccc.cccd 

(with a PVID = to the VLAN) 

If the native vlan is not 1: 

A STP BPDU for VLAN 1 will be sent untagged (on the native vlan) to MAC 

0180.c200.0000 (this is the common spanning tree) 

A PVST+ BPDU for VLAN1 will be sent with a 802.1Q tag to MAC 0100.0ccc.cccd (with a PVID=1) 

A PVST+ BPDU for the native vlan will be sent untagged to MAC 0100.0ccc.cccd (with a PVID=native vlan) 

A PVST+ BPDU for all other vlans will be sent with a 802.1Q tag to MAC 0100.0ccc.cccd (with a PVID = to the VLAN) 


Q475. Refer to the exhibit. 

Which two statements about the output are true? (Choose two.) 

A. It indicates that prefix aggregation cache export is enabled on the device. 

B. It was obtained with the show ip cache flow command. 

C. It indicates that the device is using NetFlow version 5. 

D. It indicates that the flows are being sent to a destination using an RFC1918 address. 

Answer: C,D 

Explanation: 

C. The fourth line shows that Version 5 is being used. 

D. The third line shows that the destination server is 10.5.206.250, which of course is a private, RFC 1918 address. 


Up to the minute 400-101 practice exam:

Q476. Refer to the exhibit. 

How many LSDBs will router A have? 

A. 0 

B. 1 

C. 2 

D. 3 

Answer:


Q477. Refer to the exhibit. 

If the traffic flowing from network 192.168.254.0 to 172.16.250.0 is unencrypted, which two actions must you take to enable encryption? (Choose two). 

A. Configure the transform-set on R2 to match the configuration on R1. 

B. Configure the crypto map on R2 to include the correct subnet. 

C. Configure the ISAKMP policy names to match on R1 and R2. 

D. Configure the crypto map names to match on R1 and R2. 

E. Configure the Diffie-Hellman keys used in the ISAKMP policies to be different on R1 and R2. 

Answer: A,B 

Explanation: 

A transform set combines an encryption method and an authentication method. During the IPsec security association negotiation with ISAKMP, the peers agree to use a particular transform set to protect a particular data flow. The transform set must be the same for both peers. Also, the crypto map on R2 points to the address name of VPN, which includes 172.16.0.0/16, but it should be the local subnet of 192.168.0.0/16 


Q478. DRAG DROP 

Drag and drop the BGP attribute on the left to the correct category on the right. 

Answer: 


Q479. Which Cisco IOS VPN technology leverages IPsec, mGRE, dynamic routing protocol, NHRP, and 

Cisco Express Forwarding? 

A. FlexVPN 

B. DMVPN 

C. GETVPN 

D. Cisco Easy VPN 

Answer:


Q480. When you implement CoPP on your network, what is its default action? 

A. permit all traffic 

B. rate-limit bidirectional traffic to the control plane 

C. drop management ingress traffic to the control plane 

D. monitor ingress and egress traffic to the control plane by using access groups that are applied to the interface 

E. block all traffic 

Answer: