Finding Most up-to-date 400-101 secret


The article at Testaimer.com going over http://www.testaimer.com/400-101-test is very comprehensive.

Q81. Which algorithm heavily influenced the algorithm used by path-vector protocols? 

A. Bellman-Ford 

B. SPF 

C. DUAL 

D. Spanning-Tree 

E. Adaptive 

F. Deflection 

Answer:

Explanation: 

A path vector protocol is a computer network routing protocol which maintains the path information that gets updated dynamically. Updates which have looped through the network and returned to the same node are easily detected and discarded. This algorithm is sometimes used in Bellman–Ford routing algorithms to avoid "Count to Infinity" problems. 

Reference: http://en.wikipedia.org/wiki/Path_vector_protocol 


Q82. Which type of port would have root guard enabled on it? 

A. A root port 

B. An alternate port 

C. A blocked port 

D. A designated port 

Answer:

Explanation: 

The root guard feature provides a way to enforce the root bridge placement in the network. The root guard ensures that the port on which root guard is enabled is the designated port. Normally, root bridge ports are all designated ports, unless two or more ports of the root bridge are connected together. If the bridge receives superior STP Bridge Protocol Data Units (BPDUs) on a root guard-enabled port, root guard moves this port to a root-inconsistent STP state. This root-inconsistent state is effectively equal to a listening state. No traffic is forwarded across this port. In this way, the root guard enforces the position of the root bridge. 

Reference: http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/10588-74.html 


Q83. Refer to the exhibit. 

Which two statements are true? (Choose two.) 

A. This is the output of the show ip ospf command. 

B. This is the output of the show ip protocols command. 

C. This router is an ABR. 

D. This router is an ASBR. 

E. Authentication is not configured for the area. 

Answer: A,E 

Explanation: 

The following is sample output from the show ip ospf command when entered without a specific OSPF process ID with no authentication. 

Router# show ip ospf 

Routing Process "ospf 201" with ID 10.0.0.1 and Domain ID 10.20.0.1 

Supports only single TOS(TOS0) routes 

Supports opaque LSA 

SPF schedule delay 5 secs, Hold time between two SPFs 10 secs 

Minimum LSA interval 5 secs. Minimum LSA arrival 1 secs 

LSA group pacing timer 100 secs 

Interface flood pacing timer 55 msecs 

Retransmission pacing timer 100 msecs 

Number of external LSA 0. Checksum Sum 0x0 

Number of opaque AS LSA 0. Checksum Sum 0x0 

Number of DCbitless external and opaque AS LSA 0 

Number of DoNotAge external and opaque AS LSA 0 

Number of areas in this router is 2. 2 normal 0 stub 0 nssa 

External flood list length 0 

Area BACKBONE(0) 

Number of interfaces in this area is 2 

Area has no authentication 

SPF algorithm executed 4 times 

Area ranges are 

Number of LSA 4. Checksum Sum 0x29BEB 

Number of opaque link LSA 0. Checksum Sum 0x0 

Number of DCbitless LSA 3 Number of indication LSA 0 

Number of DoNotAge LSA 0 Flood list length 0 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_ospf/command/iro-cr-book/ospf-s1.html#wp8749965360 


Q84. Which AS_PATH attribute can you use to prevent loops when implementing BGP confederations? 

A. AS_CONFED_SET 

B. AS_SEQUENCE 

C. AS_CONFED_SEQUENCE 

D. AS_SET 

Answer:


Q85. Which option describes the purpose of the leak-map keyword in the command eigrp stub connected leak-map EigrpLeak? 

A. It allows the specified static routes to be advertised. 

B. It allows exceptions to the route summarization that is configured. 

C. It allows specified EIGRP-learned routes to be advertised. 

D. It restricts specified connected routes from being advertised. 

Answer:

Explanation: 

ExamplE. eigrp stub leak-map Command 

In the following example, the eigrp stub command is issued with the leak-map name keyword-argument pair to configure the device to reference a leak map that identifies routes to be advertised that would have been suppressed otherwisE. 

Device(config)# router eigrp 1 

Device(config-router)# network 10.0.0.0 

Device(config-router)# eigrp stub leak-map map1 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_eigrp/configuration/15-mt/ire-15-mt-book/ire-eigrp-stub-rtg.html#GUID-FB899CA9-E9DE-48D8-8048-C971179E4E24 


Q86. DRAG DROP 

Drag and drop the PPPoE packet type on the left to the corresponding description on the right. 

Answer: 


Q87. DRAG DROP 

Drag and drop the Cisco IOX XE subpackage on the left to the function it performs on the right. 

Answer: 


Q88. Refer to the exhibit. 

Which two routes are included in the route update? (Choose two.) 

A. 10.3.0.0 

B. 10.3.2.0 

C. 10.3.4.0 

D. 10.3.6.0 

E. 10.3.3.0 

Answer: C,D 

Explanation: 

This access list will permit the 10.3.4.0, 10.3.5.0, 10.3.6.0, and 10.3.7.0 subnets. 


Q89. Which option is the Cisco recommended method to secure access to the console port? 

A. Configure the activation-character command. 

B. Configure a very short timeout (less than 100 milliseconds) for the port. 

C. Set the privilege level to a value less than 15.

D. Configure an ACL. 

Answer:

Explanation: 

The activation-character command defines a session activation character. Entering this character at a vacant terminal begins a terminal session. The default activation character is the Return key 

To secure the console port, you should change this character to a different one as most people simply hit the enter key when trying to access the console. 


Q90. Which two options are requirements for Control-Plane Policing? (Choose two.) 

A. Cisco Express Forwarding must be enabled globally. 

B. Cisco Discovery Protocol must be disabled in the control plane. 

C. A crypto policy must be installed. 

D. A loopback address must be configured for device access. 

E. A class map must be configured to identify traffic. 

Answer: A,E