Top Improve 400-101 actual test Reviews!

Proper study guides for Up to the immediate present Cisco CCIE Routing and Switching (v5.0) certified begins with Cisco 400-101 preparation products which designed to deliver the Highest Quality 400-101 questions by making you pass the 400-101 test at your first time. Try the free 400-101 demo right now.

2021 Mar 400-101 free exam

Q331. Under Cisco IOS Software, which two features are supported in RADIUS Change of Authorization requests? (Choose two.) 

A. session identification 

B. session reauthentication 

C. session termination 

D. host termination 

Answer: A,C 


CoA requests, as described in RFC 5176, are used in a pushed model to allow for session identification, host reauthentication, and session termination. The model comprises one request (CoA-Request) and two possible response codes. 


Q332. Refer to the exhibit. 

All switches have default bridge priorities, and originate BPDUs with MAC addresses as indicated. The numbers shown are STP link metrics. Which two ports are forwarding traffic after STP converges? (Choose two.) 

A. The port connecting switch SWD with switch SWE 

B. The port connecting switch SWG with switch SWF 

C. The port connecting switch SWC with switch SWE 

D. The port connecting switch SWB with switch SWC 

Answer: C,D 


Here, we know SWB to SWC are forwarding because we already identified the blocking port. So for the last correct answer let’s consider what must be done to prevent a switch loop between SWC/SWD/SWE. SWE to SWD will be blocked because SWC has a lower MAC address so it wins the forwarding port. And to look at it further, you could try to further understand what would happen with ports on SWG. Would the ports on SWG try to go through SWE or SWF? SWE has the lower MAC address so the port from SWG to SWE would win the forwarding election. Therefore, answer B could never be correct. 

Q333. Refer to the exhibit. 

How can Router X in AS70000 peer with Router Y in AS65000, in case Router Y supports only 2-byte ASNs? 

A. Router X should be configured with a remove-private-as command, because this will establish the peering session with a random private 2-byte ASN. 

B. It is not possible. Router Y must be upgraded to an image that supports 4-byte ASN. 

C. Router Y should be configured with a 4-byte AS using the local-as command. 

D. Router X should be configured with a 2-byte AS using the local-as command. 



Since router Y does not support 4-byte ASN,s it will not understand any AS numbers larger than 65535, so router X should use the local-as command on the peering statement to router Y to so that it sends in a 2-byte ASN to router Y. 

Q334. Which two descriptions of the keying mechanisms that are used to distribute the session keys used in routing authentication are true? (Choose two.) 

A. Peer keying creates a unique one-to-one relationship with another peer. 

B. Group keying creates a single keying message to multiple peers. 

C. Peer keying creates a single keying message to multiple peers. 

D. Group keying creates a unique one-to-one relationship with another peer. 

E. Group keying creates a full mesh of keying sessions to all devices. 

F. Peer keying creates a full mesh of keying sessions to all devices. 

Answer: A,B 

Q335. Which type of EIGRP routes are summarized by the auto-summary command? 

A. internal routes that are learned from a peer that is outside the range of local network statements 

B. external routes that are learned from a peer that is inside the range of local network statements 

C. locally created routes that are outside the range of local network statements 

D. external routes that are learned from a peer that is outside the range of local network statements 



Auto-Summarization of External Routes 

EIGRP will not auto-summarize external routes unless there is a component of the same major network that is an internal route. To illustrate, let us look at Figure 15. 

Router Three is injecting external routes to and into EIGRP using the redistribute connected command, as shown in the configurations below. 

Router Three 

interface Ethernet0 

ip address 

interface Ethernet1 

ip address 

interface Ethernet2 

ip address 

!router eigrp 2000 

redistribute connected 


default-metric 10000 1 255 1 1500 

With this configuration on Router Three, the routing table on Router One shows: 

one# show ip route is subnetted, 2 subnets 

D [90/11023872] via, 00:02:03, Serial0 

C is directly connected, Serial0 is subnetted, 1 subnets 

D EX [170/11049472] via, 00:00:53, Serial0 

D EX [170/11049472] via, 00:00:53, Serial0 

Although auto-summary normally causes Router Three to summarize the and routes into one major net destination (, it does not do this because both routes are external. However, if you reconfigure the link between Routers Two and Three to, and add network statements for this network on Routers Two and Three, the auto-summary is then generated on Router Two. 

Router Three 

interface Ethernet0 

ip address 

interface Ethernet1 

ip address 

interface Serial0 

ip address 

router eigrp 2000 network 

Now Router Two generates the summary for 

two# show ip route 

D is a summary, 00:06:48, Null0 

And Router One shows only the summary routE. 

one# show ip route is subnetted, 1 subnets 

C is directly connected, Serial0 

D [90/11023872] via, 00:00:36, Serial0 


Updated 400-101 question:

Q336. Refer to the exhibit. 

Router 1 and Router 2 use HSRP to provide first hop redundancy for hosts on the network. 

Which feature can provide additional failover coverage for the PC? 

A. Cisco Express Forwarding 

B. NetFlow 

C. Accounting 

D. Enhanced Object Tracking 



HSRP has a mechanism for tracking the interface line-protocol state. The enhanced object tracking feature separates the tracking mechanism from HSRP. It creates a separate, standalone tracking process that can be used by processes other than HSRP. This feature allows tracking of other objects in addition to the interface line-protocol state. A client process, such as HSRP, can register an interest in tracking objects and request notification when the tracked object changes state. Several clients can track the same object, and can take different actions when the object changes state. This feature increases the availability and speed of recovery of a router system and decreases outages and outage duration. 



Drag each SNMP term on the left to the matching definition on the right. 


Q338. Which two BGP path attributes are visible in Wireshark? (Choose two.) 

A. weight 

B. AS path 

C. local preference 

D. route maps 

Answer: B,C 

Q339. Refer to the exhibit. 

ASN 64523 has a multihomed BGP setup to ISP A and ISP B. Which BGP attribute can you set to allow traffic that originates in ASN 64523 to exit the ASN through ISP B? 

A. origin 

B. next-hop 

C. weight 

D. multi-exit discriminator 



MED is an optional nontransitive attribute. MED is a hint to external neighbors about the preferred path into an autonomous system (AS) that has multiple entry points. The MED is also known as the external metric of a route. A lower MED value is preferred over a higher value. Example at reference link below: 


Q340. Refer to the exhibit. 

Which configuration is missing that would enable SSH access on a router that is running Cisco IOS XE Software? 

A. int Gig0/0/0 


B. class-map ssh-class 

match access-group protect-ssh 

policy-map control-plane-in 

class ssh-class 

police 80000 conform transmit exceed drop 


service-policy input control-plane-in 

C. control-plane host 

management-interface GigabitEthernet0/0/0 allow ssh 

D. interface Gig0/0/0 

ip access-group protect-ssh in 



The feature Management Plane Protection (MPP) allows an administrator to restrict on which interfaces management traffic can be received by a device. This allows the administrator additional control over a device and how the device is accessed. This example shows how to enable the MPP in order to only allow SSH and HTTPS on the GigabitEthernet0/1 interface: 

control-plane host 

management-interface GigabitEthernet 0/1 allow ssh https