100% Guarantee 400-101 practice exam Reviews & Tips

It is impossible to pass Cisco 400-101 exam without any help in the short term. Come to Ucertify soon and find the most advanced, correct and guaranteed Cisco 400-101 practice questions. You will get a surprising result by our Renew CCIE Routing and Switching (v5.0) practice guides.


The article at Testaimer.com going over http://www.testaimer.com/400-101-test is very comprehensive.

2021 Apr 400-101 exam prep

Q231. Which two statements about the metric-style wide statement as it applies to route redistribution are true? (Choose two.) 

A. It is used in IS-IS. 

B. It is used in OSPF. 

C. It is used in EIGRP. 

D. It is used for accepting TLV. 

E. It is used in PIM for accepting mroutes. 

F. It is used for accepting external routes. 

Answer: A,D 

Explanation: 

To configure a router running IS-IS to generate and accept only new-style TLVs (TLV stands for type, length, and value object), use the metric-style wide command. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/TE_1208S.html#wp49409 


Q232. Which two statements about class maps are true? (Choose two.) 

A. As many as eight DSCP values can be included in a match dscp statement. 

B. The default parameter on a class map with more than one match command is match-any. 

C. The match class command can nest a class map within another class map. 

D. A policy map can be used to designate a protocol within a class map. 

Answer: A,C 

Explanation: 

Answer A. 

Router(config-cmap)# match [ip] dscp dscp-value [dscp-value dscp-value dscp-value 

dscp-value dscp-value dscp-value dscp-value] 

(Optional) Identifies a specific IP differentiated service code point (DSCP) value as a match criterion. Up to eight DSCP values can be included in one match statement. 

Answer C. 

Router config-cmap)# match class-map class-name (Optional) Specifies the name of a traffic class to be used as a matching criterion (for nesting traffic class [nested class maps] within one another). 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/qos/configuration/guide/fqos_c/qcfmcli2.html 


Q233. Refer to the exhibit. 

Which statement about this GETVPN configuration is true? 

A. Co-operative key servers are configured. 

B. Redundant peers are configured. 

C. The key server uses multicast mode to propagate rekey messages. 

D. PSK authentication is configured. 

Answer:


Q234. Which flag in a configuration BPDU instructs all switches to shorten their bridge table aging process from the default 300 seconds to the current forward delay value? 

A. topology change bit 

B. topology change acknowledgment bit 

C. priority bit 

D. max-age bit 

Answer:

Explanation: 

The Root Bridge continues to set the Topology Change flag (TCN bit) in all Configuration BPDUs that it sends out for a total of Forward Delay + Max Age seconds (default = 35 (20+15) seconds). This flag instructs all bridges to shorten their MAC address table (Bridge table) aging process from the default value of 300 seconds to the current Forward Delay value of the bridge (default=15 seconds). The TCA flag is set by the upstream bridge to tell the downstream bridges to stop sending TCN BPDUs. The TC flag is set in configuration BPDU by the Root Bridge to shorten the bridge table age-out period from default 300 seconds to Forward Delay seconds. 


Q235. Which statement about UDLD is true? 

A. The udld reset command resets ports that have been error-disabled by both UDLD and Fast UDLD. 

B. Fast UDLD is configured in aggressive mode. 

C. Only bidirectional link failures can be detected in normal mode. 

D. Each switch in a UDLD topology can send and receive packets to and from its neighbors. 

Answer:


Latest 400-101 free download:

Q236. Which two statements about the function of PIM designated router are true? (Choose two.) 

A. It registers directly connected source to the PIM rendezvous point. 

B. It sends PIM asserts on the interface of the outgoing interface list. 

C. It sends PIM Join/Prune messages for directly connected receivers. 

D. It forwards multicast traffic from the source into the PIM network. 

E. It sends IGMP queries. 

Answer: A,C 


Q237. Which two values are needed to configure NTP authentication? (Choose two.) 

A. the encryption method 

B. the key number 

C. the burst mode 

D. the key string 

E. the Diffie-Hellman group 

Answer: B,D 


Q238. Refer to the exhibit. 

Which statement about the route target for 192.168.1.0/24 is true? 

A. Its route target is 64512:100010051. 

B. Its route targets are 64512:100010051, 64512:2002250, and 64512:3002300. 

C. Its route target is 64512:3002300. 

D. Its route targets are 64512:100010051 and 64512:3002300. 

E. Its route targets are 64512:2002250 and 64512:3002300. 

Answer:

Explanation: 

Here we are using route maps to change the route target for the 192.168.1.0/24 network from the default route target of 64512:100010051 to 64512:3002300. 


Q239. Which two conditions must be met by default to implement the BGP multipath feature? (Choose two.) 

A. The next-hop routers must be the same. 

B. Route reflectors must be enabled. 

C. All attributes must have the same values. 

D. MPLS must be enabled. 

E. The next-hop routers must be different. 

Answer: C,E 


Q240. Refer to the exhibit. 

While troubleshooting high CPU utilization on one of your Cisco Catalyst switches, you find that the issue is due to excessive flooding that is caused by STP. What can you do to prevent this issue from happening again? 

A. Disable STP completely on the switch. 

B. Change the STP version to RSTP. 

C. Configure PortFast on port-channel 1. 

D. Configure UplinkFast on the switch. 

E. Configure PortFast on interface Gi0/15. 

Answer:

Explanation: 

Topology Changes (TC) should be a rare event in a well-configured network. When a link on a switch port goes up or down, there is eventually a TC, once the STP state of the port is changing to or from forwarding. When the port is flapping, this would cause repetitive TCs and flooding. 

Ports with the STP portfast feature enabled will not cause TCs when going to or from the forwarding state. The configuration of portfast on all end-device ports (such as printers, PCs, and servers) should limit TCs to a low amount and is highly recommended. 

Reference: http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/28943-170.html