An Expert interview about ccie 400 101

we provide Guaranteed Cisco ccie 400 101 dumps actual test which are the best for clearing 400 101 pdf test, and to get certified by Cisco CCIE Routing and Switching (v5.0). The 400 101 ccie Questions & Answers covers all the knowledge points of the real 400 101 dumps exam. Crack your Cisco ccie 400 101 Exam with latest dumps, guaranteed!


The article at Testaimer.com going over http://www.testaimer.com/400-101-test is very comprehensive.

Q471. Refer to the exhibit. 

If the remaining configuration uses default values, what is the expected output of the show mls qos queue-set command? 

A) 

B) 

C) 

D) 

A. Exhibit A 

B. Exhibit B 

C. Exhibit C 

D. Exhibit D 

Answer:

Explanation: 

mls qos queue-set output qset-idthreshold queue-id drop-threshold1 drop-threshold2 reserved-threshold maximum-threshold 

Configure the WTD thresholds, guarantee the availability of buffers, and configure the maximum memory allocation for the queue-set (four egress queues per port). 

By default, the WTD thresholds for queues 1, 3, and 4 are set to 100 percent. The thresholds for queue 2 are set to 200 percent. The reserved thresholds for queues 1, 2, 3, 

and 4 are set to 50 percent. The maximum thresholds for all queues are set to 400 percent. 

. For qset-id , enter the ID of the queue-set specified in Step 2. The range is 1 to 2. 

. For queue-id , enter the specific queue in the queue-set on which the command is performed. The range is 1 to 4. 

. For drop-threshold1 drop-threshold2 , specify the two WTD thresholds expressed as a percentage of the queue’s allocated memory. Th e range is 1 to 3200 percent. 

. For reserved-threshold , enter the amount of memory to be guaranteed (reserved) for the queue expressed as a percentage of the allocated memory. The range is 1 to 100 percent. 

. For maximum-threshold , enable a queue in the full condition to obtain more buffers than are reserved for it. This is the maximum memory the queue can have before the packets are dropped if the common pool is not empty. The range is 1 to 3200 percent 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/1 2-2_55_se/configuration/guide/3750xscg/swqos.html 


Q472. Refer to the exhibit. 

RIPv2 authentication is failing on a device with this configuration. Which two actions can you take to enable it? (Choose two.) 

A. Set the RIP authentication mode to text. 

B. Set the RIP authentication mode to MD5. 

C. Configure the password encryption for the key. 

D. Set the password encryption to AES. 

Answer: A,B 

Explanation: 

See the reference link below for information on configuring RIPv2 authentication, including both test and MD5 modes. 

Reference: http://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol-rip/13719-50.html#configuringplain 


Q473. Refer to the exhibit. 

You are configuring the S1 switch for the switchport connecting to the client computer. Which option describes the effect of the command mls qos map cos-dscp 0 8 16 24 32 40 46 56? 

A. Voice traffic is excluded from the default priority queue. 

B. Voice packets are given a class selector of 5. 

C. Video conferencing is marked CS3. 

D. Voice packets are processed in the priority queue. 

Answer:

Explanation: 

The default CoS to DSCP mappings are shown below: 

Default CoS-to-DSCP Map 

CoS Value 

DSCP Value 

16 

24 

32 

40 

48 

56 

In our example, we see that COS 6 is mapped to DSCP, not the default of DSCP 48 as shown above. DSCP 46 is Expedited Forwarding (EF), which is typically used for voice traffic, and this value has not been included in this class map. 


Q474. Refer to the exhibit. 

Which two pieces of information in this Wireshark capture indicate that you are viewing EIGRP traffic? (Choose two.) 

A. the header length 

B. the protocol number 

C. the destination address 

D. the Class Selector 

E. the source address 

F. the header checksum 

Answer: B,C 

Explanation: 

EIGRP uses protocol number 88, which shows as EIGRP in the capture. Also, we in the capture that the destination IP address is 224.0.0.10, which is the Enhanced Interior Gateway Routing Protocol (EIGRP) group address is used to send routing information to all EIGRP routers on a network segment. 


Q475. Which command do you use to connect a dense-mode domain to a sparse-mode multicast domain? 

A. none, because there is no such command 

B. ip pim spt-threshold infinity 

C. ip pim register dense-mode 

D. ip pim dense-mode proxy-register 

Answer:

Explanation: 

For IP PIM multicast, Cisco recommends Sparse-Mode over Dense-Mode. In the midst of our network migration, we have a new network operating in Sparse-Mode with Anycast rendezvous point (RP) but our existing network is still operating in Dense-Mode. To bridge two different modes across both PIM domains, we should use the ip pim dense-mode proxy-register command on the interface leading toward the bordering dense mode region. This configuration will enable the border router to register traffic from the dense mode region (which has no concept of registration) with the RP in the sparse mode domain. 

Reference: http://networkerslog.blogspot.com/2010/12/bridging-dense-mode-pim-to-sparse-mode.html 


Q476. Refer to the exhibit. 

If the traffic flowing from network 192.168.254.0 to 172.16.250.0 is unencrypted, which two actions must you take to enable encryption? (Choose two). 

A. Configure the transform-set on R2 to match the configuration on R1. 

B. Configure the crypto map on R2 to include the correct subnet. 

C. Configure the ISAKMP policy names to match on R1 and R2. 

D. Configure the crypto map names to match on R1 and R2. 

E. Configure the Diffie-Hellman keys used in the ISAKMP policies to be different on R1 and R2. 

Answer: A,B 

Explanation: 

A transform set combines an encryption method and an authentication method. During the IPsec security association negotiation with ISAKMP, the peers agree to use a particular transform set to protect a particular data flow. The transform set must be the same for both peers. Also, the crypto map on R2 points to the address name of VPN, which includes 172.16.0.0/16, but it should be the local subnet of 192.168.0.0/16 


Q477. Which option describes the purpose of the PPP endpoint discriminator? 

A. It identifies the maximum payload packet. 

B. It notifies the peer that it prefers 12-bit sequence numbers. 

C. It identifies the system attached to the link. 

D. It determines whether a loopback is on the link. 

Answer:

Explanation: 

In situations in which many clients use the same username to initiate an MP connection, or when interoperating with non-Cisco routers, you need to control the order in which the bundle name is created. It is necessary to configure the access server to create a bundle name based on the endpoint discriminator first, the username second, or both. The endpoint discriminator identifies the system transmitting the packet and advises the network access server (NAS) that the peer on this link could be the same as the peer on another existing link. Because every client has a unique endpoint discriminator, only multiple links from the same client are bundled into a single unique MP connection. For example, consider when two PC clients initiate a multilink connection to an access server using the same username. If the multilink bundle name is established based on the endpoint discriminator first, then on the username or on both, the NAS can accurately bundle the links from each client using the endpoint discriminator as a bundle name. This bundle name is unique to the peer system transmitting the packet. 

Reference: http://www.cisco.com/c/en/us/support/docs/wan/point-to-point-protocol-ppp/10238-mppp-bundle-name.html 


Q478. DRAG DROP 

Drag and drop the NetFlow Export feature on the left to the NetFlow version that first supported it on the right. 

Answer: 


Q479. Which option describes how a router responds if LSA throttling is configured and it receives the identical LSA before the interval is set? 

A. The LSA is added to the OSPF database and a notification is sent to the sending router to slow down its LSA packet updates. 

B. The LSA is added to the OSPF database. 

C. The LSA is ignored. 

D. The LSA is ignored and a notification is sent to the sending router to slow down its LSA packet updates. 

Answer:

Explanation: 

How OSPF LSA Throttling Works 

The timers throttle lsa all command controls the generation (sending) of LSAs. The first LSA is always generated immediately upon an OSPF topology change, and the next LSA generated is controlled by the minimum start interval. The subsequent LSAs generated for the same LSA are rate-limited until the maximum interval is reached. The "same LSA" is defined as an LSA instance that contains the same LSA ID number, LSA type, and advertising router ID. 

The timers LSA arrival command controls the minimum interval for accepting the same LSA. If an instance of the same LSA arrives sooner than the interval that is set, the LSA is dropped. It is recommended that the arrival interval be less than or equal to the hold-time interval of the timers throttle lsa all command. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/fsolsath.html 


Q480. Refer to the exhibit. 

Which statement is true? 

A. There is no issue with forwarding IPv6 traffic from this router. 

B. IPv6 traffic can be forwarded from this router, but only on Ethernet1/0. 

C. IPv6 unicast routing is not enabled on this router. 

D. Some IPv6 traffic will be blackholed from this router. 

Answer:

Explanation: 

Here we see that the IPV6 default route shows two different paths to take, one via Ethernet 1/0 and one via Ethernet 0/0. However, only Eth 1/0 shows a next hop IPV6 address (the link local IPV6 address). There is no link local next hop addressed known on Eth 0/0. Therefore, traffic to all destinations will be load balanced over the two paths, but only half of the IPv6 traffic will be sent to the correct upstream router.