Why You Need To 400 101 vce?

Exam Code: passleader 400 101 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CCIE Routing and Switching (v5.0)
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass ccie 400 101 dumps Exam.


Free VCE & PDF File for Cisco 400-101 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on:

Q461. Refer to the exhibit. 

Which two statements about the device that generated the output are true? (Choose two.) 

A. The SPT-bit is set. 

B. The sparse-mode flag is set. 

C. The RP-bit is set. 

D. The source-specific host report was received. 

Answer: A,D 


In this example we can see that the s, T, and I flags are set. Here is a list of the flags and their meanings: 

show ip mroute Field Descriptions 

Field Description 


Provides information about the entry. 

D – Dense 

Entry is operating in dense mode. 

S – Sparse 

Entry is operating in sparse mode. 

B – Bidir Group 

Indicates that a multicast group is operating in bidirectional mode. 

s – SSM Group Indicates that a multicast group is within the SSM range of IP addresses. This flag is reset if the SSM range changes. 

C – Connected 

A member of the multicast group is present on the directly connected interface. 

L – Local 

The router itself is a member of the multicast group. 

P – Pruned 

Route has been pruned. The Cisco IOS software keeps this information so that a downstream member can join the source. 

R – RP-bit set 

Indicates that the (S, G) entry is pointing toward the RP. This is typically prune state along the shared tree for a particular source. 

F – Register flag 

Indicates that the software is registering for a multicast source. 

T – SPT-bit set 

Indicates that packets have been received on the shortest path source tree. 

J – Join SPT 

For (*, G) entries, indicates that the rate of traffic flowing down the shared tree is exceeding the SPT-Threshold set for the group. (The default SPT-Threshold setting is 0 kbps.) When the J- Join shortest path tree (SPT) flag is set, the next (S, G) packet received down the shared tree triggers an (S, G) join in the direction of the source, thereby causing the router to join the source tree. 

For (S, G) entries, indicates that the entry was created because the SPT-Threshold for the group was exceeded. When the J- Join SPT flag is set for (S, G) entries, the router monitors the traffic rate on the source tree and attempts to switch back to the shared tree for this source if the traffic rate on the source tree falls below the SPT-Threshold of the group for more than 1 minute. 

M – MSDP created entry 

Indicates that a (*, G) entry was learned through a Multicast Source Discovery Protocol (MSDP) peer. This flag is only applicable for a rendezvous point (RP) running MSDP. 

X – Proxy Join Timer Running 

Indicates that the proxy join timer is running. This flag is only set for (S, G) entries of an RP or "turnaround" router. A "turnaround" router is located at the intersection of a shared path (*, G) tree and the shortest path from the source to the RP. 

A – Advertised via MSDP 

Indicates that an (S, G) entry was advertised through an MSDP peer. This flag is only applicable for an RP running MSDP. 

U – URD 

Indicates that a URD channel subscription report was received for the (S, G) entry. 

I – Received Source Specific Host Report 

Indicates that an (S, G) entry was created by an (S, G) report. This (S, G) report could have been created by IGMPv3, URD, or IGMP v3lite. This flag is only set on the designated router (DR). 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/12s_ssm.html 

Q462. Which technology can create a filter for an embedded packet capture? 

A. Control plane policing 

B. Access lists 


D. Traffic shaping 



A filter can be applied to limit the capture to desired traffic. Define an Access Control List (ACL) within config mode and apply the filter to the buffer: 

ip access-list extended BUF-FILTER 

permit ip host host 

permit ip host host 

monitor capture buffer BUF filter access-list BUF-FILTER 

Reference: http://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-embedded-packet-capture/116045-productconfig-epc-00.html 

Q463. Which two pieces of information does RTCP use to inform endpoint devices about the RTP flow? (Choose two.) 

A. the transmitted octet 

B. the lost packet count 

C. session control function provisioning information 

D. the CNAME for session participants 

E. the authentication method 

F. MTU size changes in the path of the flow 

Answer: A,B 


RTCP transports statistics for a media connection and information such as transmitted octet and packet counts, packet loss, packet delay variation, and round-trip delay time. An application may use this information to control quality of service parameters, perhaps by limiting flow, or using a different codec. 

Reference: http://en.wikipedia.org/wiki/RTP_Control_Protocol 

Q464. Which three statements about implementing a NAT application layer gateway in a network are true? (Choose three.) 

A. It allows client applications to use dynamic ports to communicate with a server regardless of whether NAT is being used. 

B. It maintains granular security over application-specific data. 

C. It allows synchronization between multiple streams of data between two hosts. 

D. Application layer gateway is used only in VoIP/SIP deployments. 

E. Client applications require additional configuration to use an application layer gateway. 

F. An application layer gateway inspects only the first 64 bytes of a packet before forwarding it through the network. 

Answer: A,B,C 


An application-level gateway (ALG), also known as an application-layer gateway, is an application that translates the IP address information inside the payload of an application packet. An ALG is used to interpret the application-layer protocol and perform firewall and Network Address Translation (NAT) actions. These actions can be one or more of the following depending on your configuration of the firewall and NAT: 

. Allow client applications to use dynamic TCP or UDP ports to communicate with the server application. 

. Recognize application-specific commands and offer granular security control over them. 

. Synchronize multiple streams or sessions of data between two hosts that are exchanging data. 

. Translate the network-layer address information that is available in the application payload 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_nat/configuration/xe-3s/asr1000/nat-xe-3s-asr1k-book/fw-msrpc-supp.html 

Q465. Which statement about the BGP originator ID is true? 

A. The route reflector always sets the originator ID to its own router ID. 

B. The route reflector sets the originator ID to the router ID of the route reflector client that injects the route into the AS. 

C. The route reflector client that injects the route into the AS sets the originator ID to its own router ID. 

D. The originator ID is set to match the cluster ID. 



An RR reflecting the route received from a RR-Client adds: 

. Originator ID- a 4-byte BGP attribute that is created by the RR. This attribute carries the Router ID of the originator of the route in the local AS. If the update comes back to the originator, it ignores the update. 

. Cluster List- A Cluster List is a list of Cluster IDs that an update has traversed. When a route reflector sends a route received from a client to a non-client, it appends the local Cluster ID. If a route reflector receives a route whose Cluster List contains the local Cluster ID, it ignores the update. 

Reference: https://sites.google.com/site/amitsciscozone/home/bgp/bgp-route-reflectors 

Q466. Under which condition does UDP dominance occur? 

A. when TCP traffic is in the same class as UDP 

B. when UDP flows are assigned a lower priority queue 

C. when WRED is enabled 

D. when ACLs are in place to block TCP traffic 



Drag each OSPF route-type identifier on the left to its description on the right. 


Q468. Which two statements about the metric-style wide statement as it applies to route redistribution are true? (Choose two.) 

A. It is used in IS-IS. 

B. It is used in OSPF. 

C. It is used in EIGRP. 

D. It is used for accepting TLV. 

E. It is used in PIM for accepting mroutes. 

F. It is used for accepting external routes. 

Answer: A,D 


To configure a router running IS-IS to generate and accept only new-style TLVs (TLV stands for type, length, and value object), use the metric-style wide command. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/TE_1208S.html#wp49409 

Q469. Which protocol uses a proprietary 2-byte Type field for multiple protocol support? 






Q470. Refer to the exhibit. 

Which two statements are true regarding prefix (Choose two.) 

A. The prefix is in policy, and Cisco PfR rerouted the traffic via Et0/1 because of an OOP event. 

B. Cisco PfR is monitoring the prefix via passive NetFlow mode only. 

C. Cisco PfR is monitoring the prefix via active, fast, or active throughput IP SLA probe mode only. 

D. The prefix is in policy, and Cisco PfR did not reroute the traffic via Et0/1 because the traffic was previously in policy. 

E. Cisco PfR is monitoring the prefix via mode monitor, which provides both NetFlow and IP SLA measurements. 

Answer: D,E 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/pfr/command/pfr-cr-book/pfr-s1.html#wp2707728086