Act now and download your Cisco ccie 400 101 dumps test today! Do not waste time for the worthless Cisco 400 101 dumps tutorials. Download Renewal Cisco CCIE Routing and Switching (v5.0) exam with real questions and answers and begin to learn Cisco 400 101 dumps with a classic professional.

Q11. Which two technologies are supported by EIGRP? (Choose two.) 

A. clear-text authentication 

B. MD5 authentication 

C. stub routing 

D. multiple areas 

Answer: B,C 

Explanation: 

The IP Enhanced IGRP Route Authentication feature provides MD5 authentication of routing updates from the EIGRP routing protocol. The MD5 keyed digest in each EIGRP packet prevents the introduction of unauthorized or false routing messages from unapproved sources. The EIGRP stub routing feature improves network stability, reduces resource utilization, and simplifies the stub device configuration. Stub routing is commonly used in hub-and-spoke network topologies. In a hub-and-spoke network, one or more end (stub) networks are connected to a remote device (the spoke) that is connected to one or more distribution devices (the hub). The remote device is adjacent to one or more distribution devices. The only route for IP traffic to reach the remote device is through a distribution device. 

References: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_eigrp/configuration/15-s/ire-15-s-book/ire-rte-auth.html http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_eigrp/configuration/15-s/ire-15-s-book/ire-eigrp-stub-rtg.html 


Q12. Which command do you use to connect a dense-mode domain to a sparse-mode multicast domain? 

A. none, because there is no such command 

B. ip pim spt-threshold infinity 

C. ip pim register dense-mode 

D. ip pim dense-mode proxy-register 

Answer:

Explanation: 

For IP PIM multicast, Cisco recommends Sparse-Mode over Dense-Mode. In the midst of our network migration, we have a new network operating in Sparse-Mode with Anycast rendezvous point (RP) but our existing network is still operating in Dense-Mode. To bridge two different modes across both PIM domains, we should use the ip pim dense-mode proxy-register command on the interface leading toward the bordering dense mode region. This configuration will enable the border router to register traffic from the dense mode region (which has no concept of registration) with the RP in the sparse mode domain. 

Reference: http://networkerslog.blogspot.com/2010/12/bridging-dense-mode-pim-to-sparse-mode.html 


Q13. Which statement is true about VPLS? 

A. MPLS is not required for VPLS to work. 

B. VPLS carries packets as Layer 3 multicast. 

C. VPLS has been introduced to address some shortcomings of OTV. 

D. VPLS requires an MPLS network. 

Answer:

Explanation: 

VPLS uses MPLS labels so an MPLS network is required. VPLS MPLS packets have a two-label stack. The outer label is used for normal MPLS forwarding in the service provider's network. If BGP is used to establish the VPLS, the inner label is allocated by a PE as part of a label block. If LDP is used, the inner label is a virtual circuit ID assigned by LDP when it first established a mesh between the participating PEs. Every PE keeps track of assigned inner label, and associates these with the VPLS instance. 

Reference: http://en.wikipedia.org/wiki/Virtual_Private_LAN_Service 


Q14. Which two Cisco Express Forwarding tables are located in the data plane? (Choose two.) 

A. the forwarding information base 

B. the label forwarding information base 

C. the IP routing table 

D. the label information table 

E. the adjacency table 

Answer: A,B 

Explanation: 

The control plane runs protocols such as OSPF, BGP, STP, LDP. These protocols are needed so that routers and switches know how to forward packets and frames. 

The data plane is where the actual forwarding takes place. The data plane is populated based on the protocols running in the control plane. The Forwarding Information Base (FIB) is used for IP traffic and the Label FIB is used for MPLS. 


Q15. Which two options about PIM-DM are true? (Choose two.) 

A. PIM-DM initally floods multicast traffic throughout the network. 

B. In a PIM-DM network, routers that have no upstream neighbors prune back unwanted traffic. 

C. PIM-DM supports only shared trees. 

D. PIM-DM uses a pull model to deliver multicast traffic. 

E. PIM-DM cannot be used to build a shared distribution tree. 

Answer: A,E 


Q16. Refer to the exhibit. 

Why is the loopback 0 interface of R4 missing in the routing table of R2? 

A. R2 is configured as a route reflector client. 

B. There is no peering between R2 and R3. 

C. The next hop is not reachable from R2. 

D. The route originated within the same AS. 

Answer:

Explanation: 

In the “show ip bgp” output we see that there is no peering session between R2 and R3. Since R3 is the route reflector here, R3 would reflect routes advertised from R4 to R2, but the peer needs to be established first. 


Q17. Which statement about MSS is true? 

A. It is negotiated between sender and receiver. 

B. It is sent in all TCP packets. 

C. It is 20 bytes lower than MTU by default. 

D. It is sent in SYN packets. 

E. It is 28 bytes lower than MTU by default. 

Answer:

Explanation: 

The maximum segment size (MSS) is a parameter of the Options field of the TCP header that specifies the largest amount of data, specified in octets, that a computer or communications device can receive in a single TCP segment. It does not count the TCP header or the IP header. The IP datagram containing a TCP segment may be self-contained within a single packet, or it may be reconstructed from several fragmented pieces; either way, the MSS limit applies to the total amount of data contained in the final, reconstructed TCP segment. The default TCP Maximum Segment Size is 536. Where a host wishes to set the maximum segment size to a value other than the default, the maximum segment size is specified as a TCP option, initially in the TCP SYN packet during the TCP handshake. The value cannot be changed after the connection is established. 

Reference: http://en.wikipedia.org/wiki/Maximum_segment_size 


Q18. Which three options are three benefits of an MPLS VPN? (Choose three.) 

A. It allows IP address space overlap by maintaining customer routes in a private routing table. 

B. It offers additional security by preventing intrusions directly into the customer routing table. 

C. It offers a transparent virtual network in which all customer sites appear on one LAN. 

D. It offers additional security by allowing only dynamic routing protocols between CE and PE routers. 

E. It allows IP address space overlap by maintaining customer routes in the global routing table with unique BGP communities. 

F. Providers can send only a default route for Internet access into the customer VPN. 

Answer: A,B,C 


Q19. Which statement about OTV is true? 

A. The overlay interface becomes active only when configuration is complete and it is manually enabled. 

B. OTV data groups can operate only in PIM sparse-mode. 

C. The overlay interface becomes active immediately when it is configured. 

D. The interface facing the OTV groups must be configured with the highest MTU possible. 

Answer:

Explanation: 

OTV has the following configuration guidelines and limitations: 

. If the same device serves as the default gateway in a VLAN interface and the OTV edge device for the VLANs being extended, configure OTV on a device (VDC or switch) that is separate from the VLAN interfaces (SVIs). 

. When possible, we recommend that you use a separate nondefault VDC for OTV to allow for better manageability and maintenance. 

. An overlay interface will only be in an up state if the overlay interface configuration is complete and enabled (no shutdown). The join interface has to be in an up state. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/nx-os/OTV/config_guide/b_Cisco_Nexus_7000_Series_NX-OS_OTV_Configuration_Guide/basic-otv.html 


Q20. Which option describes the purpose of the PPP endpoint discriminator? 

A. It identifies the maximum payload packet. 

B. It notifies the peer that it prefers 12-bit sequence numbers. 

C. It identifies the system attached to the link. 

D. It determines whether a loopback is on the link. 

Answer:

Explanation: 

In situations in which many clients use the same username to initiate an MP connection, or when interoperating with non-Cisco routers, you need to control the order in which the bundle name is created. It is necessary to configure the access server to create a bundle name based on the endpoint discriminator first, the username second, or both. The endpoint discriminator identifies the system transmitting the packet and advises the network access server (NAS) that the peer on this link could be the same as the peer on another existing link. Because every client has a unique endpoint discriminator, only multiple links from the same client are bundled into a single unique MP connection. For example, consider when two PC clients initiate a multilink connection to an access server using the same username. If the multilink bundle name is established based on the endpoint discriminator first, then on the username or on both, the NAS can accurately bundle the links from each client using the endpoint discriminator as a bundle name. This bundle name is unique to the peer system transmitting the packet. 

Reference: http://www.cisco.com/c/en/us/support/docs/wan/point-to-point-protocol-ppp/10238-mppp-bundle-name.html