Want to know Testking 400 101 ccie Exam practice test features? Want to lear more about Cisco CCIE Routing and Switching (v5.0) certification experience? Study Approved Cisco passleader 400 101 answers to Update ccie 400 101 dumps questions at Testking. Gat a success with an absolute guarantee to pass Cisco 400 101 ccie (CCIE Routing and Switching (v5.0)) test on your first attempt.

Q151. Refer to the exhibit. 

If you change the Spanning Tree Protocol from pvst to rapid-pvst, what is the effect on the interface Fa0/1 port state? 

A. It transitions to the listening state, and then the forwarding state. 

B. It transitions to the learning state and then the forwarding state. 

C. It transitions to the blocking state, then the learning state, and then the forwarding state. 

D. It transitions to the blocking state and then the forwarding state. 

Answer:

Explanation: 

First, the port will transition to the blocking state, immediately upon the change, then it will transition to the new RSTP states of learning and forwarding. 

Port States 

There are only three port states left in RSTP that correspond to the three possible operational states. The 802.1D disabled, blocking, and listening states are merged into a unique 802.1w discarding state. 

STP (802.1D) Port State 

RSTP (802.1w) Port State 

Is Port Included in Active Topology? 

Is Port Learning MAC Addresses? 

Disabled 

Discarding 

No 

No 

Blocking 

Discarding 

No 

No 

Listening 

Discarding 

Yes 

No 

Learning 

Learning 

Yes 

Yes 

Forwarding 

Forwarding 

Yes 

Yes 


Q152. Refer to the exhibit. 

Which statement about authentication on Router A is true? 

A. The router will attempt to authenticate users against TACACS+ only. 

B. The router will attempt to authenticate users against the local database only. 

C. The router will attempt to authenticate users against the local database first, and fall back to TACACS+ if the local database authentication fails. 

D. The router will authenticate users against the default database only. 

E. The router will attempt to authenticate users against TACACS+ first, and fall back to the local database if the TACACS+ authentication fails. 

Answer:


Q153. Which command correctly configures standby tracking for group 1 using the default decrement priority value? 

A. standby 1 track 100 

B. standby 1 track 100 decrement 1 

C. standby 1 track 100 decrement 5 

D. standby 1 track 100 decrement 20 

Answer:


Q154. Which two are features of DMVPN? (Choose two.) 

A. It does not support spoke routers behind dynamic NAT. 

B. It requires IPsec encryption. 

C. It only supports remote peers with statically assigned addresses. 

D. It supports multicast traffic. 

E. It offers configuration reduction. 

Answer: D,E 

Explanation: 

DMVPN Hub-and-spoke deployment model: In this traditional topology, remote sites (spokes) are aggregated into a headend VPN device at the corporate headquarters (hub). Traffic from any remote site to other remote sites would need to pass through the headend device. Cisco DMVPN supports dynamic routing, QoS, and IP Multicast while significantly reducing the configuration effort. 

Reference: http://www.cisco.com/c/en/us/products/collateral/security/dynamic-multipoint-vpn-dmvpn/data_sheet_c78-468520.html 


Q155. Which two options are disadvantages of a commingled dual-tier WAN rate-based Ethernet circuit? (Choose two.) 

A. It requires the maintenance of separate chassis. 

B. It has limited scalability. 

C. It requires additional CPU resources at the subscriber end. 

D. It is more difficult to secure. 

E. It can increase the likelihood of packet drops. 

Answer: A,E 


Q156. Which three TLVs does LLDP use to discover network devices? (Choose three.) 

A. Management address 

B. Port description 

C. Network policy 

D. System name 

E. Location information 

F. Power management 

Answer: A,B,D 

Explanation: 

Basic Management TLV Set 

This set includes the following five TLVs used in LLDP: 

. Port description TLV: Provides a description of the port in an alpha-numeric format. The value equals the ifDescr object, if the LAN device supports RFC 2863. 

. System name TLV: Provides the system's assigned name in an alpha-numeric format. The value equals the sysName object, if the LAN device supports RFC 3418. 

. System description TLV: Provides a description of the network entity in an alpha-numeric format. This includes system's name and versions of hardware, operating system and networking software supported in the device. The value equals the sysDescr object, if the LAN device supports RFC 3418. 

. System capabilities TLV: Indicates the primary function(s) of the device and whether or not these functions are enabled in the device. The capabilities are indicated by two octects. Bits 0 through 7 indicate Other, Repeater, Bridge, WLAN AP, Router, Telephone, DOCSIS cable device and Station respectively. Bits 8 through 15 are reserved. 

. Management address TLV: Indicates the addresses of the local LLDP agent. Other remote managers can use this address to obtain information related to the local device. 

Reference: http://www.eetimes.com/document.asp?doc_id=1272069 


Q157. Which statement is true regarding the UDP checksum? 

A. It is used for congestion control. 

B. It cannot be all zeros. 

C. It is used by some Internet worms to hide their propagation. 

D. It is computed based on the IP pseudo-header. 

Answer:

Explanation: 

The method used to compute the checksum is defined in RFC 768: “Checksum is the 16-bit one's complement of the one's complement sum of a pseudo header of information from the IP header, the UDP header, and the data, padded with zero octets at the end (if necessary) to make a multiple of two octets.” In other words, all 16-bit words are summed using one's complement arithmetic. Add the 16-bit values up. Each time a carry-out (17th bit) is produced, swing that bit around and add it back into the least significant bit. The sum is then one's complemented to yield the value of the UDP checksum field. If the checksum calculation results in the value zero (all 16 bits 0) it should be sent as the one's complement (all 1s). 

Reference: http://en.wikipedia.org/wiki/User_Datagram_Protocol 


Q158. Which three options are characteristics of a Type 10 LSA? (Choose three.) 

A. It is an area-local, opaque LSA. 

B. Data is flooded to all routers in the LSA scope. 

C. It is used for traffic-engineering extensions to OSPF. 

D. It is a link-local, opaque LSA. 

E. Data is flooded only to the routers in the LSA scope that understand the data. 

F. It is used for traffic-engineering extensions to LDP. 

Answer: A,B,C 


Q159. Which component of the BGP ORF can you use to permit and deny routing updates? 

A. match 

B. action 

C. AFI 

D. SAFI 

E. ORF type 

Answer:


Q160. Which option is an incorrect design consideration when deploying OSPF areas? 

A. area 1 - area 0 - MPLS VPN backbone - area 0 - area 2 

B. area 1 - MPLS VPN backbone - area 2 

C. area 1 - MPLS VPN backbone - area 1 

D. area 2 - area 0 - MPLS VPN backbone - area 1 

E. area 0 - area 2 - MPLS VPN superbackbone - area 1 

Answer:

Explanation: 

In the case of MPLS-VPN Backbone as The OSPF superbackbone behaves exactly like Area 0 in regular OSPF, so we cannot have two different area 0’s that are not directly connected to each other. When area 0 connects to the superbackbone, it simply becomes an extension of area 0.