There exists a quite normal myth concerning the Cisco 400-101 review qualification that its a extremely hard sort of qualification for being reached. Nevertheless this is a totally fake concept. It merely requires the proper 400-101 examine fabric and will also be along when it comes to results. Even if there are several internet sites in which carry out it might be, but the majority of them are possibly fraudulent or perhaps out of date. Consequently, be extremely careful also very important as part of your choice of the website.
2017 Apr 400-101 exam question
Q471. DRAG DROP
Drag and drop the path-selection criteria on the left into the correct route-selection order on the right, that a router will use when having multiple routes toward the same destination.
Q472. Which two statements about the default SNMP configuration are true? (Choose two.)
A. The SNMP agent is enabled.
B. The SNMP trap receiver is configured.
C. All SNMP notification types are sent.
D. SNMPv1 is the default version.
E. SNMPv3 is the default version.
Default SNMP Configuration
Enabled SNMP community strings
SNMP trap receiver
If no version keyword is present, the default is version 1.
If no keyword is entered, the default is the noauth (noAuthNoPriv) security level.
SNMP notification type
If no type is specified, all notifications are sent.
Q473. What is the preferred method to improve neighbor loss detection in EIGRP?
A. EIGRP natively detects neighbor down immediately, and no additional feature or configuration is required.
B. BFD should be used on interfaces that support it for rapid neighbor loss detection.
C. Fast hellos (subsecond) are preferred for EIGRP, so that it learns rapidly through its own mechanisms.
D. Fast hellos (one-second hellos) are preferred for EIGRP, so that it learns rapidly through its own mechanisms.
Bi-directional Forwarding Detection (BFD) provides rapid failure detection times between forwarding engines, while maintaining low overhead. It also provides a single, standardized method of link/device/protocol failure detection at any protocol layer and over any media.
Reference: “Bidirectional Forwarding Detection for EIGRP”
Q474. What is the destination multicast MAC address for BPDUs on the native VLAN, for a switch that is running 802.1D?
A. 0185. C400. 0000
If the native vlan is 1:
A STP BPDU for VLAN 1 will be sent untagged to MAC 0180.c200.0000 (this is the
common spanning tree)
A PVST+ BPDU for VLAN 1 will be sent untagged to MAC 0100.0ccc.cccd
A PVST+ BPDU for all other vlans will be sent with a 802.1Q tag to MAC 0100.0ccc.cccd
(with a PVID = to the VLAN)
If the native vlan is not 1:
A STP BPDU for VLAN 1 will be sent untagged (on the native vlan) to MAC
0180.c200.0000 (this is the common spanning tree)
A PVST+ BPDU for VLAN1 will be sent with a 802.1Q tag to MAC 0100.0ccc.cccd (with a PVID=1)
A PVST+ BPDU for the native vlan will be sent untagged to MAC 0100.0ccc.cccd (with a PVID=native vlan)
A PVST+ BPDU for all other vlans will be sent with a 802.1Q tag to MAC 0100.0ccc.cccd (with a PVID = to the VLAN)
Q475. Refer to the exhibit.
Which two statements about the output are true? (Choose two.)
A. It indicates that prefix aggregation cache export is enabled on the device.
B. It was obtained with the show ip cache flow command.
C. It indicates that the device is using NetFlow version 5.
D. It indicates that the flows are being sent to a destination using an RFC1918 address.
C. The fourth line shows that Version 5 is being used.
D. The third line shows that the destination server is 10.5.206.250, which of course is a private, RFC 1918 address.
Up to the minute 400-101 practice exam:
Q476. Refer to the exhibit.
How many LSDBs will router A have?
Q477. Refer to the exhibit.
If the traffic flowing from network 192.168.254.0 to 172.16.250.0 is unencrypted, which two actions must you take to enable encryption? (Choose two).
A. Configure the transform-set on R2 to match the configuration on R1.
B. Configure the crypto map on R2 to include the correct subnet.
C. Configure the ISAKMP policy names to match on R1 and R2.
D. Configure the crypto map names to match on R1 and R2.
E. Configure the Diffie-Hellman keys used in the ISAKMP policies to be different on R1 and R2.
A transform set combines an encryption method and an authentication method. During the IPsec security association negotiation with ISAKMP, the peers agree to use a particular transform set to protect a particular data flow. The transform set must be the same for both peers. Also, the crypto map on R2 points to the address name of VPN, which includes 172.16.0.0/16, but it should be the local subnet of 192.168.0.0/16
Q478. DRAG DROP
Drag and drop the BGP attribute on the left to the correct category on the right.
Q479. Which Cisco IOS VPN technology leverages IPsec, mGRE, dynamic routing protocol, NHRP, and
Cisco Express Forwarding?
D. Cisco Easy VPN
Q480. When you implement CoPP on your network, what is its default action?
A. permit all traffic
B. rate-limit bidirectional traffic to the control plane
C. drop management ingress traffic to the control plane
D. monitor ingress and egress traffic to the control plane by using access groups that are applied to the interface
E. block all traffic