It is more faster and easier to pass the Cisco 400 101 pdf exam by using Real Cisco CCIE Routing and Switching (v5.0) questuins and answers. Immediate access to the Regenerate 400 101 vce Exam and find the same core area 400 101 pdf questions with professionally verified answers, then PASS your exam with a high score now.
2017 NEW RECOMMEND
Free VCE & PDF File for Cisco 400-101 Real Exam
Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions
Q351. How many bytes comprise the system ID within an IS-IS NET?
A. 4 bytes
B. 6 bytes
C. 8 bytes
D. 16 bytes
E. 20 bytes
Routers are identified with NETs of 8 to 20 bytes. ISO/IEC 10589 distinguishes only three fields in the NSAP address format: a variable-length area address beginning with a single octet, a system ID, and a 1-byte n-selector. Cisco implements a fixed length of 6 bytes for the system ID, which is like the OSPF router ID.
Reference: http://www.cisco.com/en/US/products/ps6599/products_white_paper09186a00800a3e6f.sh tml
Q352. Which two OSPF network types require the use of a DR and BDR? (Choose two.)
A. non-broadcast networks
B. point-to-point networks
C. point-to-multipoint networks
D. broadcast networks
E. point-to-multipoint non-broadcast networks
Q353. Refer to the exhibit.
Two multicast domains are configured as shown and connected with MSDP, but the two
domains are unable to communicate. Which two actions can you take to correct the problem? (Choose two.)
A. Change the peering IP address in AS 65220 to 10.0.0.20.
B. Change the peering AS on R2 to 65210.
C. Verify that UDP port 639 is open.
D. Verify that TCP port 139 is open.
E. Change the MSDP originator-id to GigabitEthernet 0/0/0 on both routers.
F. Change the MSDP peering IP address on R2 to 172.16.1.13.
Q354. What is the function of an implicit-null label?
A. It notifies the upstream LSR to remove the top label in the label stack and forward the packet.
B. It notifies the upstream LSR to add a VPN label to the label stack.
C. It is used to statically assign a label to an IGP route.
D. It is used to identify the router ID.
Q355. Which Cisco IOS VPN technology leverages IPsec, mGRE, dynamic routing protocol, NHRP, and
Cisco Express Forwarding?
D. Cisco Easy VPN
Q356. DRAG DROP
Drag and drop the BGP attribute on the left to the correct category on the right.
Q357. Which three statements about implementing an application layer gateway in a network are true? (Choose three.)
A. It allows client applications to use dynamic ports to communicate with a server regardless of whether NAT is being used.
B. It maintains granular security over application-specific data.
C. It allows synchronization between multiple streams of data between two hosts.
D. Application layer gateway is used only in VoIP/SIP deployments.
E. Client applications require additional configuration to use an application layer gateway.
F. An application layer gateway inspects only the first 64 bytes of a packet before forwarding it through the network.
An ALG may offer the following functions:
. allowing client applications to use dynamic ephemeral TCP/ UDP ports to communicate with the known ports used by the server applications, even though a firewall configuration may allow only a limited number of known ports. In the absence of an ALG, either the ports would get blocked or the network administrator would need to explicitly open up a large number of ports in the firewall â rendering the network vulnerable to attacks on those ports.
. converting the network layer address information found inside an application payload between the addresses acceptable by the hosts on either side of the firewall/NAT. This aspect introduces the term 'gateway' for an ALG.
. recognizing application-specific commands and offering granular security controls over them
. synchronizing between multiple streams/sessions of data between two hosts exchanging data. For example, an FTP application may use separate connections for passing control commands and for exchanging data between the client and a remote server. During large file transfers, the control connection may remain idle. An ALG can prevent the control connection getting timed out by network devices before the lengthy file transfer completes.
Q358. DRAG DROP
Drag and drop each step in the performance-monitoring configuration process on the left into the correct order on the right.
Q359. Which two events occur when a packet is decapsulated in a GRE tunnel? (Choose two.)
A. The destination IPv4 address in the IPv4 payload is used to forward the packet.
B. The TTL of the payload packet is decremented.
C. The source IPv4 address in the IPv4 payload is used to forward the packet.
D. The TTL of the payload packet is incremented.
E. The version field in the GRE header is incremented.
F. The GRE keepalive mechanism is reset.
After the GRE encapsulated packet reaches the remote tunnel endpoint router, the GRE packet is decapsulated. The destination address lookup of the outer IP header (this is the same as the tunnel destination address) will find a local address (receive) entry on the ingress line card. The first step in GRE decapsulation is to qualify the tunnel endpoint, before admitting the GRE packet into the router, based on the combination of tunnel source (the same as source IP address of outer IP header) and tunnel destination (the same as destination IP address of outer IP header). If the received packet fails tunnel admittance qualification check, the packet is dropped by the decapsulation router. On successful tunnel admittance check, the decapsulation strips the outer IP and GRE header off the packet, then starts processing the inner payload packet as a regular packet. When a tunnel endpoint decapsulates a GRE packet, which has an IPv4/IPv6 packet as the payload, the destination address in the IPv4/IPv6 payload packet header is used to forward the packet, and the TTL of the payload packet is decremented.
Q360. Refer to the exhibit.
What does "(received-only)" mean?
A. The prefix 10.1.1.1 can not be advertised to any eBGP neighbor.
B. The prefix 10.1.1.1 can not be advertised to any iBGP neighbor.
C. BGP soft reconfiguration outbound is applied.
D. BGP soft reconfiguration inbound is applied.
When you configure bgp soft-configuration-inbound, all the updates received from the neighbor will be stored unmodified, regardless of the inbound policy, and these routes appear as â(received-only).â