Foolproof 400 101 pdf tips
It is more faster and easier to pass the Cisco 400 101 ccie exam by using Best Quality Cisco CCIE Routing and Switching (v5.0) questuins and answers. Immediate access to the Refresh ccie 400 101 dumps Exam and find the same core area 400 101 ccie questions with professionally verified answers, then PASS your exam with a high score now.
Q291. Which two statements about OSPFv3 are true? (Choose two.)
A. It supports unicast address families for IPv4 and IPv6.
B. It supports unicast address families for IPv6 only.
C. It supports only one address family per instance.
D. It supports the use of a cluster ID for loop prevention.
E. It supports multicast address families for IPv4 and IPv6.
F. It supports multicast address families for IPv6 only.
Q292. What are two reasons to define static peers in EIGRP? (Choose two.)
A. Security requirements do not allow dynamic learning of neighbors.
B. The link between peers requires multicast packets.
C. Back-level peers require static definition for successful connection.
D. The link between peers requires unicast packets.
There are two ways we can create EIGRP neighbor relationship:
+ Use “network ” command. This is the more popular way to create EIGRP neighbor relationship. That router will check which interfaces whose IP addresses belong to the and turn EIGRP on that interface. EIGRP messages are sent via multicast packets.
+ Use “neighbor” commanD. The interface(s) that have this command applied no longer send or receive EIGRP multicast packets. EIGRP messages are sent via unicast. The router only accepts EIGRP packets from peers that are explicitly configured with a neighbor statement. Consequently, any messages coming from routers without a corresponding neighbor statement are discarded. This helps prevent the insertion of unauthorized routing peers -> A and D are correct.
Q293. Refer to the exhibit.
R2 is unable to access the 172.16.1.0/30 network between R1 and R3. Which option is a possible reason for the failure?
A. The seed metric for redistributing into RIP on R3 is missing.
B. The OSPF processes on R2 and R3 are different.
C. Auto-summary is misconfigured under the RIP process of R3.
D. The subnet mask on the link between R2 and R3 is smaller than /30.
E. The wildcard mask on R3 is misconfigured.
The problem is that RIP requires a seed metric to be specified when redistributing routes into that protocol. A seed metric is a "starter metric" that gives the RIP process a metric it can work with. The OSPF metric of cost is incomprehensible to RIP, since RIP's sole metric is hop count.
Reference: http://www.thebryantadvantage.com/CCNP%20Certification%20BSCI%20Exam%20Tutoria l%20Route%20Redistribution%20Seed%20Metric.htm
Q294. Which two discovery mechanism does LDP support? (Choose two.)
Q295. Which three statements about EIGRP and BFD are true? (Choose three.)
A. BFD is independent of the routing protocol, so it can be used as a generic failure detection mechanism for EIGRP.
B. Some parts of BFD can be distributed to the data plane, so it can be less CPU-intensive than reduced timers, which exist wholly at the control plane.
C. Reduced EIGRP timers have an absolute minimum detection timer of 1-2 seconds; BFD can provide sub-second failure detection.
D. BFD is tied to specific routing protocols and can be used for generic fault detection for the OSPF, EIGRP, and BGP routing protocols.
E. BFD is dependent on the EIGRP routing protocol, so it can be used as a specific failure detection mechanism.
F. BFD resides on the control plane, so it is less CPU-intensive than if it resided on the data plane.
There are several advantages to implementing BFD over reduced timer mechanisms for routing protocols:
. Although reducing the EIGRP, IS-IS, and OSPF timers can result in minimum detection timer of one to two seconds, BFD can provide failure detection in less than one second.
. Because BFD is not tied to any particular routing protocol, it can be used as a generic and consistent failure detection mechanism for EIGRP, IS-IS, and OSPF.
. Because some parts of BFD can be distributed to the data plane, it can be less CPU-intensive than the reduced EIGRP, IS-IS, and OSPF timers, which exist wholly at the control plane.
Q296. Refer to the exhibit.
Which three statements about this configuration are true? (Choose three.)
A. The default route appears in the global routing table.
B. The static route appears in the VRF red routing table.
C. The subnet 192.168.1.0 is unique to the VRF red routing table.
D. The static route is added to the global routing table and leaked from the VRF red.
E. The subnet 192.168.1.0 is unique to the global routing table.
F. 192.168.1.1 is reachable using any of the addresses on the router where the static route is configured.
This is an example of the route leaking feature. Here, this static route is created for the red VRF so it will be installed into the red VRF routing table, but the use of the global keyword will cause this default route to appear in the global routing table.
Q297. Refer to the exhibit.
Which statement about this COS-DSCP mapping is true?
A. The expedited forwarding DSCP is mapped to COS 3.
B. COS 16 is mapped to DSCP 2.
C. The default COS is mapped to DSCP 32.
D. This mapping is the default COS-DSCP mapping on Cisco switches.
Here we see that COS 3 is mapped to DSCP 46, which is the Expedited forwarding class: The Expedited Forwarding (EF) model is used to provide resources to latency (delay) sensitive real-time, interactive traffic. The EF model uses one marking -- DSCP 46.
Q298. What is the maximum number of classes that MQC can support in a single policy map?
Q299. Which two statements about BGP best-path selection are true? (Choose two.)
A. The route with the highest local preference is preferred.
B. The weight attribute is advertised to peers.
C. The route with the lowest MED is preferred.
D. A route that originates from iBGP peers is preferred.
E. A route that originates from a router with a higher BGP router ID is preferred.
F. The lowest weight advertised is preferred.
Q300. Which technology facilitates neighbor IP address resolution in DMVPN?
C. a dynamic routing protocol
NHRP Used with a DMVPN
NHRP is used to facilitate building a VPN and provides address resolution in DMVPN. In this context, a VPN consists of a virtual Layer 3 network that is built on top of an actual Layer 3 network. The topology you use over the VPN is largely independent of the underlying network, and the protocols you run over it are completely independent of it. The VPN network (DMVPN) is based on GRE IP logical tunnels that can be protected by adding in IPsec to encrypt the GRE IP tunnels.
Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_4/ip_addr/configuration/guide/hadnhrp.html#w p1057255