Our pass rate is high to 98.9% and the similarity percentage between our ccie 400 101 dumps study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Cisco 400 101 pdf exam in just one try? I am currently studying for the Cisco 400 101 vce exam. Latest Cisco ccie 400 101 Test exam practice questions and answers, Try Cisco 400 101 vce Brain Dumps First.

Q41. Which two statements about MAC ACLs are true? (Choose two.) 

A. They support only inbound filtering. 

B. They support both inbound and outbound filtering. 

C. They are configured with the command mac access-list standard. 

D. They can filter non-IP traffic on a VLAN and on a physical interface. 

Answer: A,D 

Explanation: 

MAC ACL, also known as Ethernet ACL, can filter non-IP traffic on a VLAN and on a physical Layer 2 interface by using MAC addresses in a named MAC extended ACL. The steps to configure a MAC ACL are similar to those of extended named ACLs. MAC ACL supports only inbound traffic filtering. 

Reference: http://www.ciscopress.com/articles/article.asp?p=1181682&seqNum=4 


Q42. DRAG DROP 

Drag and drop the multicast protocol definition on the left to the correct default time interval on the right. 

Answer: 


Q43. Which option is a core event publisher for EEM? 

A. Timer 

B. Policy Director 

C. Applet 

D. Script 

Answer:

Explanation: 

EEM is a flexible, policy-driven framework that supports in-box monitoring of different components of the system with the help of software agents known as event detectors. The figure below shows the relationship between the EEM server, core event publishers (event detectors), and the event subscribers (policies). Basically, event publishers screen events and publish them when there is a match on an event specification that is provided by the event subscriber. Event detectors notify the EEM server when an event of interest occurs. The EEM policies that are configured using the Cisco command-line interface (CLI) then implement recovery on the basis of the current state of the system and the actions specified in the policy for the given event. EEM offers the ability to monitor events and take informational or corrective action when the monitored events occur or when a threshold is reached. An EEM policy is an entity that defines an event and the actions to be taken when that event occurs. There are two types of EEM policies: an applet or a script. An applet is a simple form of policy that is defined within the CLI configuration. A script is a form of policy that is written in Tool Command Language (Tcl). 

Figure 1. Embedded Event Manager Core Event Detectors 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/eem/configuration/15-mt/eem-15-mt-book/eem-overview.html 


Q44. Which three features are common to OSPF and IS-IS? (Choose three.) 

A. They both maintain a link-state database from which a Dijkstra-based SPF algorithm computes a shortest path tree. 

B. They both use DR and BDR in the broadcast network. 

C. They both use hello packets to form and maintain adjacencies. 

D. They both use NSSA and stub type areas to scale the network design. 

E. They both have areas to form a two-level hierarchical topology. 

Answer: A,C,E 


Q45. You are backing up a server with a 1 Gbps link and a latency of 2 ms. Which two statements about the backup are true? (Choose two.) 

A. The bandwidth delay product is 2 Mb. 

B. The default TCP send window size is the limiting factor. 

C. The default TCP receive window size is the limiting factor. 

D. The bandwidth delay product is 500 Mb. 

E. The bandwidth delay product is 50 Mb. 

Answer: A,C 

Explanation: 

1 Gbps is the same as 1000 Mbps, and 1000Mb x .0002 = 2 Mbps. With TCP based data transfers, the receive window is always the limiting factor, as the sender is generally able to send traffic at line rate, but then must wait for the acknowledgements to send more data. 


Q46. Which two BGP attributes are optional, non-transitive attributes? (Choose two.) 

A. AS path 

B. local preference 

C. MED 

D. weight 

E. cluster list 

Answer: C,E 


Q47. DRAG DROP 

Drag and drop the protocol on the left to the corresponding administrative distance on the right. 

Answer: 


Q48. Refer to the exhibit. 

Which two configuration changes enable you to log in to the router? (Choose two.) 

A. Configure a user name and password on the device. 

B. Modify the default login authentication group to use the terminal line password. 

C. Remove the terminal line password on the console line. 

D. Modify the terminal lines to include transport input none. 

E. Configure the terminal lines to use the local user database. 

Answer: A,B 


Q49. Refer to the exhibit. 

If router R1 is functioning as a DHCPv6 server and you enter the command show ipv6 dhcp binding, which two options are pieces of information in the output? (Choose two.) 

A. The IA PD 

B. The DUID 

C. The prefix pool 

D. The DNS server 

E. The Rapid-Commit setting 

Answer: A,B 

Explanation: 

In the following example, the show ipv6 dhcp binding command shows information about two clients, including their DUIDs, IAPDs, prefixes, and preferred and valid lifetimes: 

Router# show ipv6 dhcp binding 

Client: FE80::202:FCFF:FEA5:DC39 (GigabitEthernet2/1/0) 

DUID. 000300010002FCA5DC1C 

IA PD. IA ID 0x00040001, T1 0, T2 0 

Prefix: 3FFE:C00:C18:11::/68 

preferred lifetime 180, valid lifetime 12345 

expires at Nov 08 2002 02:24 PM (12320 seconds) 

Client: FE80::202:FCFF:FEA5:C039 (GigabitEthernet2/1/0) 

DUID. 000300010002FCA5C01C 

IA PD. IA ID 0x00040001, T1 0, T2 0 

Prefix: 3FFE:C00:C18:1::/72 

preferred lifetime 240, valid lifetime 54321 

expires at Nov 09 2002 02:02 AM (54246 seconds) 

Prefix: 3FFE:C00:C18:2::/72 

preferred lifetime 300, valid lifetime 54333 

expires at Nov 09 2002 02:03 AM (54258 seconds) 

Prefix: 3FFE:C00:C18:3::/72 

preferred lifetime 280, valid lifetime 51111 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_dhcp/configuration/xe-3s/dhcp-xe-3s-book/ip6-dhcp-prefix-xe.html 


Q50. DRAG DROP 

What is the correct order of the VSS initialization process? Drag the actions on the left to the correct initialization step on the right. 

Answer: