Getting Smart with: 400 101 dumps
We provide real cisco 400 101 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Cisco 400 101 pdf Exam quickly & easily. The cisco 400 101 PDF type is available for reading and printing. You can print more and practice many times. With the help of our Cisco cisco 400 101 dumps pdf and vce product and material, you can easily pass the passleader 400 101 exam.
Q161. Refer to the exhibit.
What does the return code 3 represent in this output?
A. The mapping of the replying router for the FEC is different.
B. The packet is label-switched at stack depth.
C. The return code is reserved.
D. The upstream index is unknown.
E. The replying router was the proper egress for the FEC.
Return Codes The Return Code is set to zero by the sender. The receiver can set it to one of the values listed below. The notation <RSC> refers to the Return Subcode. This field is filled in with the stack-depth for those codes that specify that. For all other codes, the Return Subcode MUST be set to zero.
0 No return code
1 Malformed echo request received
2 One or more of the TLVs was not understood
3 Replying router is an egress for the FEC at stack-depth <RSC>
4 Replying router has no mapping for the FEC at stack-depth <RSC>
Q162. Refer to the exhibit.
R3 is failing to join the multicast group 184.108.40.206 that is sourcing from R1. Which two actions can you take to allow multicast traffic to flow correctly? (Choose two.)
A. Remove the static multicast route on R1.
B. Configure OSPF on R1 and R3 to include the tunnel interfaces.
C. Add an additional static multicast route on R2 for multicast group 220.127.116.11 toward R3.
D. Replace the static multicast route on R1 to send traffic toward R2.
E. Remove the static unicast route on R1.
F. Add an additional static unicast route on R2 toward the loopback interface of R3.
Since the tunnel interfaces are not part of OSPF, the best path to the multicast source of R1 from R3 would be over the Gi0/0 path via OSPF. However, the static mroute is configured to use the tunnel, so this causes an RPF failure used in Sparse Mode. Best fix is to add the tunnel interfaces into OSPF and remove the static mroute so that that the RPF check no longer fails.
Q163. Which option is a correct match criterion for policy-based routing?
B. interface type
Q164. Which two message types allow PIM snooping to forward multicast traffic? (Choose two.)
A. hello messages
B. leave messages
C. membership query messages
D. bidirectional PIM DF election messages
Q165. In a nonbackbone OSPF area, all traffic that is destined to the Internet is routed by using a default route that is originated by the ABR. Which change in the configuration of the OSPF area type causes traffic from that area that is destined to the Internet to be dropped?
A. The OSPF area changes from NSSA to totally stubby area.
B. The OSPF area changes from NSSA to regular area.
C. The OSPF area changes from stub area to totally stubby area.
D. The OSPF area changes from stub area to NSSA.
The ABR for the NSSA generates the default route, but not by default. To force the ABR to generate the default route, use the area <area id> nssa default-information originate command. The ABR generates a Type 7 LSA with the link-state ID 0.0.0.0 and is advertised inside the NSSA. This default route will be propagated inside the NSSA as Type 7 LSA
Q166. Refer to the exhibit.
How can the EIGRP hello and hold time for Gig0/0 be changed to 5 and 15?
A. No action is required, since Gig0/0 is not listed with a nondefault hello and hold time.
B. Add the commands ip hello-interval eigrp 1 5 and ip hold-time eigrp 1 15 under interface Gig0/0.
C. Add the commands hello-interval 5 and hold-time 15 under "af-interface Gig0/0" under the address family.
D. Add the commands default hello-interval and default hold-time under the af-interface Gig0/0 statement under the address family.
To configure the hello interval for an interface, use the hello-interval command in interface configuration mode To configure the hold time for an interface, use the hold-time command in interface configuration mode.
Reference: http://www.cisco.com/c/en/us/td/docs/routers/crs/software/crs_r4-1/routing/command/reference/b_routing_cr41crs/b_routing_cr41crs_chapter_010.html#wp2 323069468
Q167. Which two statements about the function of a PIM designated router are true? (Choose two.)
A. It forwards multicast traffic from the source into the PIM network.
B. It registers directly connected sources to the PIM rendezvous point.
C. It sends PIM Join/Prune messages for directly connected receivers.
D. It sends IGMP queries.
E. It sends PIM asserts on the interfaces of the outgoing interface list.
In PIM ASM and SSM modes, the software chooses a designated router (DR) from the routers on each network segment. The DR is responsible for forwarding multicast data for specified groups and sources on that segment. In ASM mode, the DR is responsible for unicasting PIM register packets to the RP. When a DR receives an IGMP membership report from a directly connected receiver, the shortest path is formed to the RP, which may or may not go through the DR. The result is a shared tree that connects all sources transmitting on the same multicast group to all receivers of that group. In SSM mode, the DR triggers (*, G) or (S, G) PIM join messages toward the RP or the source. The path from the receiver to the source is determined hop by hop. The source must be known to the receiver or the DR.
Q168. Which two statements about the default behavior of IS-IS are true? (Choose two.)
A. The default IS-IS router type is L1/L2.
B. The default IS-IS metric type is wide.
C. The default IS-IS interface circuit type is L1/L2.
D. By default, two IS-IS routers must use the same hello interval and hold timer in order to become neighbors.
Q169. Which two options are contained in the MSG part of a syslog message? (Choose two.)
A. TAG field
B. CONTENT field
C. three-digit priority value
D. IP address of the sending device
E. TLS port number
Q170. Which two fields reside in the initial CHAP challenge packet? (Choose two.)
A. the authentication name of the challenger
B. a random hash value generated by the device
C. the hashed packet type ID
D. the packet type ID in clear text
When a caller A dials in to an access server B, The Access server sends across the link an initial Type 1 authentication packet called a Challenge. This Challenge packet contains a randomly generated number, an ID sequence number to identify the challenge (sent in clear text) and the authentication name of the challenger.