Surprising ccie 400 101

Your success in Cisco ccie 400 101 dumps is our sole target and we develop all our 400 101 ccie braindumps in a way that facilitates the attainment of this target. Not only is our cisco 400 101 study material the best you can find, it is also the most detailed and the most updated. 400 101 dumps Practice Exams for Cisco CCIE Routing and Switching cisco 400 101 are written to the highest standards of technical accuracy.


Free VCE & PDF File for Cisco 400-101 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on:

Q221. When you implement PfR, which IP SLA probe is used to determine the MOS? 

A. jitter 

B. latency 

C. packet loss 

D. throughput 


Q222. Which topology allows the split-horizon rule to be safely disabled when using EIGRP? 

A. full mesh 

B. partial mesh 

C. hub and spoke 

D. ring 


Q223. Which two metrics are measured with active probes when PfR voice traffic optimization is in use? (Choose two.) 


B. cost 

C. jitter 

D. bandwidth 

Answer: A,C 

Q224. Refer to the exhibit. 

Which two commands are required on R3 in order for MPLS to function? (Choose two.) 

A. mpls ip 

B. ip cef 

C. mpls label protocol tdp 

D. mpls ip propagate-ttl 

Answer: A,B 

Q225. On a network using RIPng, the prefix field of a routing table entry has a value of 0:0:0:0:0:0:0:0. What does this value signify? 

A. The next hop address is unknown. 

B. The next hop address is a site-local address. 

C. The neighboring router has IPv6 ND disabled. 

D. The next hop address must be the originator of the route advertisement. 

E. The associated route follows a default route out of the network. 


Q226. Refer to the exhibit. 

Which statement is true about a valid IPv6 address that can be configured on tunnel interface0? 

A. There is not enough information to calculate the IPv6 address. 

B. 6to4 tunneling allows you to use any IPv6 address. 

C. 2001:7DCB:5901::/128 is a valid IPv6 address. 

D. 2002:7DCB:5901::/128 is a valid IPv6 address. 



Most IPv6 networks use autoconfiguration, which requires the last 64 bits for the host. The first 64 bits are the IPv6 prefix. The first 16 bits of the prefix are always 2002:, the next 32 bits are the IPv4 address, and the last 16 bits of the prefix are available for addressing multiple IPv6 subnets behind the same 6to4 router. Since the IPv6 hosts using autoconfiguration already have determined the unique 64 bit host portion of their address, they must simply wait for a Router Advertisement indicating the first 64 bits of prefix to have a complete IPv6 address. A 6to4 router will know to send an encapsulated packet directly over IPv4 if the first 16 bits are 2002, using the next 32 as the destination, or otherwise send the packet to a well-known relay server, which has access to native IPv6. 


Q227. Which two options are mandatory components of a multiprotocol BGP VPN-IPv4 address? (Choose two.) 

A. a route distinguisher 

B. an IPv4 address 

C. a route target 

D. an MPLS label 

E. a system ID 

F. an area ID 

Answer: A,B 


The IP prefix is a member of the IPv4 address family. After the PE device learns the IP prefix, the PE converts it into a VPN-IPv4 prefix by combining it with an 8-byte route distinguisher (RD). The generated prefix is a member of the VPN-IPv4 address family. It uniquely identifies the customer address, even if the customer site is using globally nonunique (unregistered private) IP addresses. The route distinguisher used to generate the VPN-IPv4 prefix is specified by a configuration command associated with the virtual routing and forwarding (VRF) instance on the PE device. 


Q228. Which two options are differences between TACACS+ and RADIUS using AAA? (Choose two.) 

A. Only TACACS+ limits the protocols that are supported. 

B. Only RADIUS combines accounting and authentication. 

C. Only TACACS+ uses TCP. 

D. Only RADIUS combines authorization and accounting. 

E. Only RADIUS encrypts the password in packets from the client to the server. But leaves the body of the message unencrypted. 

Answer: C,E 

Q229. Which statement about the OSPF Loop-Free Alternate feature is true? 

A. It is supported on routers that are configured with virtual links. 

B. It is supported in VRF OSPF instances. 

C. It is supported when a traffic engineering tunnel interface is protected. 

D. It is supported when traffic can be redirected to a primary neighbor. 



Restrictions for OSPF IPv4 Remote Loop-Free Alternate IP Fast Reroute 

. The OSPF IPv4 Remote Loop-Free Alternate IP Fast Reroute feature is not supported on devices that are virtual links headends. 

. The feature is supported only in global VPN routing and forwarding (VRF) OSPF 


. The only supported tunneling method is MPLS. 

. You cannot configure a traffic engineering (TE) tunnel interface as a protected interface. Use the MPLS Traffic Engineering—Fast Reroute Link and Node Protection feature to protect these tunnels. For more information, see the “MPLS Traffic Engineering—Fast Reroute Link and Node Protection” section in the Multiprotocol Label Switching Configuration Guide. 

. You can configure a TE tunnel interface in a repair path, but OSPF will not verify the tunnel’s placement; you must ensure that it is not crossing the physical interface that it is intended to protect. 

. Not all routes can have repair paths. Multipath primary routes might have repair paths for all, some, or no primary paths, depending on the network topology, the connectivity of the computing router, and the attributes required of repair paths. 

. Devices that can be selected as tunnel termination points must have a /32 address advertised in the area in which remote LFA is enabled. This address will be used as a tunnel termination IP. If the device does not advertise a /32 address, it may not be used for remote LFA tunnel termination. 

. All devices in the network that can be selected as tunnel termination points must be configured to accept targeted LDP sessions using the mpls ldp discovery targeted-hello accept command. 



Drag and drop each EIGRP element on the left to the corresponding definition on the right.