Why You Need To ccie 400 101?
Your success in Cisco passleader 400 101 is our sole target and we develop all our ccie 400 101 braindumps in a way that facilitates the attainment of this target. Not only is our 400 101 dumps study material the best you can find, it is also the most detailed and the most updated. cisco 400 101 Practice Exams for Cisco CCIE Routing and Switching 400 101 vce are written to the highest standards of technical accuracy.
Q131. Which ICMP message type is used to assist path MTU discovery?
A. destination unreachable
B. redirect message
C. source quench
D. time exceeded
Q132. When BGP route reflectors are used, which attribute ensures that a routing loop is not created?
B. local preference
C. multiexit discriminator
D. originator ID
As the iBGP learned routes are reflected, routing information may loop. The route reflector model has the following mechanisms to avoid routing loops:
. Originator ID is an optional, nontransitive BGP attribute. It is a 4-byte attributed created by a route reflector. The attribute carries the router ID of the originator of the route in the local autonomous system. Therefore, if a misconfiguration causes routing information to come back to the originator, the information is ignored.
. Cluster-list is an optional, nontransitive BGP attribute. It is a sequence of cluster IDs that the route has passed. When a route reflector reflects a route from its clients to nonclient peers, and vice versa, it appends the local cluster ID to the cluster-list. If the cluster-list is empty, a new cluster-list is created. Using this attribute, a route reflector can identify if routing information is looped back to the same cluster due to misconfiguration. If the local cluster ID is found in the cluster-list, the advertisement is ignored.
Q133. Which statement about the EIGRP RTO is true?
A. It is six times the SRTT.
B. It is the time that it normally takes for an update to be received by a peer.
C. It is the time that it normally takes to receive a reply to a query.
D. It is the average time that it takes for a reliable packet to be acknowledged.
The RTO is typically six times the SRTT, the value may vary from a minimum of 200 microseconds (ms) to a maximum of 5 seconds (s).
Reference: EIGRP for IP: Basic Operation and Configuration, Alvaro Retana, Russ White, Don Slice - 2000
Q134. Which two statements about packet fragmentation on an IPv6 network are true? (Choose two.)
A. The fragment header is 64 bits long.
B. The identification field is 32 bits long.
C. The fragment header is 32 bits long.
D. The identification field is 64 bits long.
E. The MTU must be a minimum of 1280 bytes.
F. The fragment header is 48 bits long.
The fragment header is shown below, being 64 bits total with a 32 bit identification field:
Q135. Which option is the default maximum age of the MAC address table?
A. 300 seconds
B. 500 seconds
C. 1200 seconds
D. 3600 seconds
To configure the maximum aging time for entries in the Layer 2 table, use the mac-address-table aging-time command in global configuration mode.
MAC address table entry maximum age. Valid values are 0, and from 5 to 1000000 seconds. Aging time is counted from the last time that the switch detected the MAC address. The default value is 300 seconds.
Reference: http://www.cisco.com/c/en/us/td/docs/ios/lanswitch/command/reference/lsw_book/lsw_m1. html
Q136. Refer to the exhibit.
Which three statements about the R1 configuration are true? (Choose three.)
A. The virtual circuit identifier is 1611 and the virtual circuit is down.
B. The local label for the circuit is 4006.
C. The targeted LDP session to the remote peer is up.
D. The local label for the circuit is 1611.
E. The virtual circuit identifier is 4006 and the virtual circuit is down.
F. The circuit is using MPLS VC type 4.
The number after the vc is the identifier, which is 1611 in this case. Here, the VC status is shown as down.
As shown, the MPLS VC labels: local 4006, remote unassigned shows the local label used is 4006.
The targeted LDP session is up as verified by the “Signalling protocol: LDP, peer 172.16.12.70 up” statement in the output.
Q137. Which statement is true about IGMP?
A. Multicast sources send IGMP messages to their first-hop router, which then generates a PIM join message that is then sent to the RP.
B. Multicast receivers send IGMP messages to their first-hop router, which then forwards the IGMP messages to the RP.
C. IGMP messages are encapsulated in PIM register messages and sent to the RP.
D. Multicast receivers send IGMP messages to signal their interest to receive traffic for specific multicast groups.
In the example shown above, the receivers (the designated multicast group) are interested in receiving the video data stream from the source. The receivers indicate their interest by sending an Internet Group Management Protocol (IGMP) host report to the routers in the network. The routers are then responsible for delivering the data from the source to the receivers.
Q138. On which three options can Cisco PfR base its traffic routing? (Choose three.)
A. Time of day
B. An access list with permit or deny statements
C. Load-balancing requirements
D. Network performance
E. User-defined link capacity thresholds
F. Router IOS version
Key Advantages of using PfR for Load balancing:
. Utilization based load-balancing: PfR takes real-time link utilization into account when load balancing the links. This will ensure that a link will not go beyond a certain percentage of its maximum capacity (75% by default).
. Application Performance based Load Balancing: PfR does not randomly forward traffic through one link or another. It takes application performance requirements into consideration and then forwards the traffic through a link which meets the performance policy requirements. PfR also load balances the link at the same time.
. Bi-directional Solution: PfR is a bi-directional load balancing solution which influences outbound as well as in-bound traffic.
. Consolidated Centralized View: PfR offers consolidated and centralized view of the state of all external links in the network. At any given time, the network administrator can see the current link utilization (in kbps and percentage of its capacity), maximum link threshold, and the policies applied to the links in the network.
Q139. Refer to the exhibit.
Which two statements are true regarding prefix 10.1.0.0/24? (Choose two.)
A. The prefix is in policy, and Cisco PfR rerouted the traffic via 10.4.5.3 Et0/1 because of an OOP event.
B. Cisco PfR is monitoring the prefix via passive NetFlow mode only.
C. Cisco PfR is monitoring the prefix via active, fast, or active throughput IP SLA probe mode only.
D. The prefix is in policy, and Cisco PfR did not reroute the traffic via 10.4.5.3 Et0/1 because the traffic was previously in policy.
E. Cisco PfR is monitoring the prefix via mode monitor, which provides both NetFlow and IP SLA measurements.
Q140. Which IPv6 prefix is used for 6to4 tunnel addresses?
6to4 works by taking advantage of a reserved IPv6 prefix, 2002::/16. A 6to4 tunnel interface automatically converts the 32 bits in its IPv6 address following this prefix to a global unicast IPv4 address for transport across an IPv4 network such as the public Internet.