Act now and download your Cisco 400 101 vce test today! Do not waste time for the worthless Cisco 400 101 pdf tutorials. Download Update Cisco CCIE Routing and Switching (v5.0) exam with real questions and answers and begin to learn Cisco 400 101 dumps with a classic professional.
2017 NEW RECOMMEND
Free VCE & PDF File for Cisco 400-101 Real Exam
Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions
Q81. Which option is the default number of routes over which EIGRP can load balance?
By default, EIGRP load-shares over four equal-cost paths. For load sharing to happen, the routes to load-share over must show up in the IP forwarding table or with the show ip route command. Only when a route shows up in the forwarding table with multiple paths to it will load sharing occur.
Q82. Which two statements about private VLANs are true? (Choose two.)
A. Only one isolated VLAN can be mapped to a primary VLAN.
B. Only one community VLAN can be mapped to a primary VLAN.
C. Multiple isolated VLANs can be mapped to a primary VLAN.
D. Multiple community VLANs can be mapped to a primary VLAN.
An isolated VLAN is a secondary VLAN that carries unidirectional traffic upstream from the hosts toward the promiscuous ports. You can configure only one isolated VLAN in a PVLAN domain. An isolated VLAN can have several isolated ports. The traffic from each isolated port also remains completely separate. Only one isolated VLAN can be mapped under a given primary VLAN. A community VLAN is a secondary VLAN that carries upstream traffic from the community ports to the promiscuous port and to other host ports in the same community. You can configure multiple community VLANs in a PVLAN domain. The ports within one community can communicate, but these ports cannot communicate with ports in any other community or isolated VLAN in the private VLAN.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus6000/sw/layer2/6x/b_6k_L ayer2_Config_6x/b_6k_Layer2_Config_602N12_chapter_011.html
Q83. Which statement about the VLAN database is true?
A. Manually deleting the vlan.dat file can cause inconsistency in the database.
B. Private VLAN information is stored in the database.
C. VLAN configurations 1 through 4096 are stored in the vlan.dat file.
D. The VLAN database is used only if the VTP domain name in the VLAN database matches the VTP domain name in the startup-config file.
Q84. Which statement about the overload bit in IS-IS is true?
A. The IS-IS adjacencies on the links for which the overload bit is set are brought down.
B. Routers running SPF ignore LSPs with the overload bit set and hence avoid blackholing traffic.
C. A router setting the overload bit becomes unreachable to all other routers in the IS-IS area.
D. The overload bit in IS-IS is used only for external prefixes.
The OL bit is used to prevent unintentional blackholing of packets in BGP transit networks. Due to the nature of these protocols, IS-IS and OSPF converge must faster than BGP. Thus there is a possibility that while the IGP has converged, IBGP is still learning the routes. In that case if other IBGP routers start sending traffic towards this IBGP router that has not yet completely converged it will start dropping traffic. This is because it isnt yet aware of the complete BGP routes. OL bit comes handy in such situations. When a new IBGP neighbor is added or a router restarts, the IS-IS OL bit is set. Since directly connected (including loopbacks) addresses on an âoverloadedâ router are considered by other routers, IBGP can be bought up and can begin exchanging routes. Other routers will not use this router for transit traffic and will route the packets out through an alternate path. Once BGP has converged, the OL bit is cleared and this router can begin forwarding transit traffic.
Q85. Which two statements about the client-identifier in a DHCP pool are true? (Choose two.)
A. It specifies a unique identifier that is used only for DHCP requests.
B. It is specified by appending 01 to the MAC address of a DHCP client.
C. It specifies a hardware address for the client.
D. It specifies a unique identifier that is used only for BOOTP requests.
E. It requires that you specify the hardware protocol.
Device(dhcp-config)# client-identifier 01b7.0813.8811.66
Specifies the unique identifier for DHCP clients.
This command is used for DHCP requests.
DHCP clients require client identifiers. You can specify the unique identifier for the client in either of the following ways:
A 7-byte dotted hexadecimal notation. For example, 01b7.0813.8811.66, where 01 represents the Ethernet media type and the remaining bytes represent the MAC address of the DHCP client.
A 27-byte dotted hexadecimal notation. For example, 7665.6e64.6f72.2d30.3032.342e.3937.6230.2e33.3734.312d.4661.302f.31. The equivalent ASCII string for this hexadecimal value is vendor-0024.97b0.3741-fa0/1, where vendor represents the vendor, 0024.97b0.3741 represents the MAC address of the source interface, and fa0/1 represents the source interface of the DHCP client.
See the Troubleshooting Tips section for information about how to determine the client identifier of the DHCP client.
The identifier specified here is considered for a DHCP client that sends a client identifier in the packet.
Q86. Which option is the origin code when a route is redistributed into BGP?
Q87. Which two statements about RSTP and MSTP BPDUs are true? (Choose two.)
A. MSTP switches can detect boundary ports when they receive RSTP version 2 BPDUs.
B. MSTP switches can detect boundary ports when they receive RSTP version 1 BPDUs.
C. RSTP switches can process MSTP version 3 BPDUs.
D. When all boundary switches are running RSTP, MST sends only version 0 configuration BPDUs.
A switch running both MSTP and RSTP supports a built-in protocol migration mechanism that enables it to interoperate with legacy 802.1D switches. If this switch receives a legacy 802.1D configuration BPDU (a BPDU with the protocol version set to 0), it sends only 802.1D BPDUs on that port. An MST switch can also detect that a port is at the boundary of a region when it receives a legacy BPDU, an MST BPDU (version 3) associated with a different region, or an RST BPDU (version 2).
Q88. Which option describes how a router responds if LSA throttling is configured and it receives the identical LSA before the interval is set?
A. The LSA is added to the OSPF database and a notification is sent to the sending router to slow down its LSA packet updates.
B. The LSA is added to the OSPF database.
C. The LSA is ignored.
D. The LSA is ignored and a notification is sent to the sending router to slow down its LSA packet updates.
How OSPF LSA Throttling Works
The timers throttle lsa all command controls the generation (sending) of LSAs. The first LSA is always generated immediately upon an OSPF topology change, and the next LSA generated is controlled by the minimum start interval. The subsequent LSAs generated for the same LSA are rate-limited until the maximum interval is reached. The "same LSA" is defined as an LSA instance that contains the same LSA ID number, LSA type, and advertising router ID.
The timers LSA arrival command controls the minimum interval for accepting the same LSA. If an instance of the same LSA arrives sooner than the interval that is set, the LSA is dropped. It is recommended that the arrival interval be less than or equal to the hold-time interval of the timers throttle lsa all command.
Q89. Refer to the exhibit.
Which feature can R1 use to fail over from R2 to R3 if the address for R2 becomes unavailable?
A. object tracking
The object tracking feature allows you to create a tracked object that multiple clients can use to modify the client behavior when a tracked object changes. Several clients register their interest with the tracking process, track the same object, and take different actions when the object state changes.
Clients include the following features:
. Embedded Event Manager (EEM)
. Gateway Load Balancing Protocol (GLBP)
. Hot Standby Redundancy Protocol (HSRP)
. Virtual port channel (vPC)
. Virtual Router Redundancy Protocol (VRRP)
The object tracking monitors the status of the tracked objects and communicates any changes made to interested clients. Each tracked object is identified by a unique number that clients can use to configure the action to take when a tracked object changes state.
Q90. Refer to the exhibit.
Which two routes are included in the route update? (Choose two.)
This access list will permit the 10.3.4.0, 10.3.5.0, 10.3.6.0, and 10.3.7.0 subnets.