Examples of 400-101 ccie written exam number

Exam Code: 400-101 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CCIE Routing and Switching (v5.0)
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass 400-101 Exam.

2016 Oct 400-101 Study Guide Questions:

Q401. DRAG DROP 

Answer: 

Q402. Which ICMP message type is used to assist path MTU discovery? 

A. destination unreachable 

B. redirect message 

C. source quench 

D. time exceeded 

Answer: A 

Q403. In GETVPN, which key is used to secure the control plane? 

A. Traffic Encryption Key (TEK) 

B. content encryption key (CEK) 

C. message encryption key (MEK) 

D. Key Encryption Key (KEK). 

Answer: D 

Explanation: 

GDOI introduces two different encryption keys. One key secures the GET VPN control plane; the other key secures the data traffic. The key used to secure the control plane is commonly called the Key Encryption Key (KEK), and the key used to encrypt data traffic is known as Traffic Encryption Key (TEK). 

Reference: Group Encrypted Transport VPN (Get VPN) Design and Implementation Guide PDF 

400-101  rapidshare

Avant-garde 400-101 ccie dumps free download:

Q404. Which two statements about packet fragmentation on an IPv6 network are true? (Choose two.) 

A. The fragment header is 64 bits long. 

B. The identification field is 32 bits long. 

C. The fragment header is 32 bits long. 

D. The identification field is 64 bits long. 

E. The MTU must be a minimum of 1280 bytes. 

F. The fragment header is 48 bits long. 

Answer: A,B 

Explanation: 

The fragment header is shown below, being 64 bits total with a 32 bit identification field: 

Reference: http://www.openwall.com/presentations/IPv6/img24.html 

Q405. Which technology can be used to prevent flooding of IPv6 multicast traffic on a switch? 

A. IGMP snooping 

B. IGMP filtering 

C. MLD snooping 

D. MLD filtering 

Answer: C 

Explanation: 

MLD snooping allows the switch to examine MLD packets and make forwarding decisions based on their content. You can configure the switch to use MLD snooping in subnets that receive MLD queries from either MLD or the MLD snooping querier. MLD snooping constrains IPv6 multicast traffic at Layer 2 by configuring Layer 2 LAN ports dynamically to forward IPv6 multicast traffic only to those ports that want to receive it. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/snoopmld.html 

Q406. Which statement describes the effect of the configuration line redistribute maximum-prefix 1500 90 withdraw? 

A. After the 1500th route is redistributed, a warning is posted in the log file and 90 more routes are redistributed before further routes are discarded. 

B. After the 1350th route is redistributed, a warning is posted in the log file until the 1500th route is redistributed, and then further routes are discarded. 

C. After the 1500th route is redistributed, further routes are discarded only if the CPU is above 90%. 

D. The routing protocol receives 1500 routes. After the routing process has redistributed 90% of the routes, the process supernets routes and injects a NULL route to prevent black-hole routing. 

Answer: B 

certleader.com

Download 400-101 ccie routing and switching pdf:

Q407. Which two statements are true about IPv6 multicast? (Choose two.) 

A. Receivers interested in IPv6 multicast traffic use IGMPv6 to signal their interest in the IPv6 multicast group. 

B. The PIM router with the lowest IPv6 address becomes the DR for the LAN. 

C. An IPv6 multicast address is an IPv6 address that has a prefix of FF00::/8. 

D. The IPv6 all-routers multicast group is FF02:0:0:0:0:0:0:2. 

Answer: C,D 

Explanation: 

Multicast addresses in IPv6 have the prefix ff00::/8. 

Well-known IPv6 multicast addresses 

Address 

Description 

ff02::1 

All nodes on the local network segment 

ff02::2 

All routers on the local network segment 

Reference: http://en.wikipedia.org/wiki/Multicast_address 

Q408. Refer to the exhibit. 

Which three statements about the output are true? (Choose three.) 

A. An mrouter port can be learned by receiving a PIM hello packet from a multicast router. 

B. This switch is configured as a multicast router. 

C. Gi2/0/1 is a trunk link that connects to a multicast router. 

D. An mrouter port is learned when a multicast data stream is received on that port from a multicast router. 

E. This switch is not configured as a multicast router. It is configured only for IGMP snooping. 

F. IGMP reports are received only on Gi2/0/1 and are never transmitted out Gi2/0/1 for VLANs 10 and 20. 

Answer: A,B,C 

Explanation: 

In this example, the switch has been configured as a multicast router since IGMP snooping has been enabled. All mrouters can learn about other mrouters by receiving a PIM hello packet from another multicast router. Also, since two different VLANs are being used by the same port of gi 2/0/1, it must be a trunk link that connects to another multicast router. 

Q409. Which command sets the maximum segment size for a TCP packet initiated from a router? 

A. ip mtu 

B. ip tcp adjust-mss 

C. ip tcp mss 

D. ip tcp window-size 

Answer: C 

Q410. Which object tracking function tracks the combined states of multiple objects? 

A. application 

B. interface 

C. stub-object 

D. list 

Answer: D 

About 400-101 Information: 400-101 Dumps

Certleader Dumps
Certleader is a company specialized on providing high quality IT exam materials and fully committed to assist our respected clients crack any IT certification tests on their 1st efforts.