Testking 400 101 pdf Questions are updated and all ccie 400 101 answers are verified by experts. Once you have completely prepared with our ccie 400 101 dumps exam prep kits you will be ready for the real ccie 400 101 dumps exam without a problem. We have Improve Cisco 400 101 vce dumps study guide. PASSED cisco 400 101 First attempt! Here What I Did.
2018 NEW RECOMMEND
Free VCE & PDF File for Cisco 400-101 Real Exam
Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions
Q91. Refer to the exhibit.
While troubleshooting high CPU utilization of a Cisco Catalyst 4500 Series Switch, you notice the error message that is shown in the exhibit in the log file.
What can be the cause of this issue, and how can it be prevented?
A. The hardware routing table is full. Redistribute from BGP into IGP.
B. The software routing table is full. Redistribute from BGP into IGP.
C. The hardware routing table is full. Reduce the number of routes in the routing table.
D. The software routing table is full. Reduce the number of routes in the routing table.
Error MessageC4K_L3HWFORWARDING-2-FWDCAMFULL:L3 routing table is full.
Switching to software forwarding.
The hardware routing table is full; forwarding takes place in the software instead. The switch performance might be degraded.
Recommended Action: Reduce the size of the routing table. Enter the ip cef command to return to hardware forwarding.
Q92. You are configuring a DMVPN spoke to use IPsec over a physical interface that is located within a VRF. For which three configuration sections must you specify the VRF name? (Choose three.)
A. the ISAKMP profile
B. the crypto keyring
C. the IPsec profile
D. the IPsec transform set
E. the tunnel interface
F. the physical interface
ip vrf forwardingvrf-name
Router(config-if)# ip vrf forwarding green
Associates a virtual private network (VPN) routing and forwarding (VRF) instance with an interface or subinterface.
. vrf-name is the name assigned to a VRF.
Router(config-if)# tunnel vrfvrf-name
Router(config-if)# tunnel vrf finance1
Associates a VPN routing and forwarding (VRF) instance with a specific tunnel destination. vrf-name is the name assigned to a VRF.
Router(config)# crypto keyringkeyring-name [vrf fvrf-name]
Defines a crypto keyring to be used during IKE authentication and enters keyring configuration mode.
. keyring-nameâName of the crypto keyring.
. fvrf-nameâ(Optional) Front door virtual routing and forwarding (FVRF) name to which the keyring will be referenced. fvrf-name must match the FVRF name that was defined during virtual routing and forwarding (VRF) configuration
Q93. Which statement describes what it means if a router has an OSPF priority set to 0?
A. A router with the OSPF priority set to 0 is one that can participate in the election of a DR. It has the highest priority.
B. A router with the OSPF priority set to 0 is one that cannot participate in the election of a DR, but it can become a BDR
C. A router with the OSPF priority set to 0 is one that cannot participate in the election of a DR. It can become neither a DR nor a BDR.
D. A router with the OSPF priority set to 0 is one that cannot participate in the election of a BDR, but it can become a DR
Q94. Which two statements about GLBP are true? (Choose two.)
A. Packets are forwarded by multiple routers that share one virtual IP address.
B. The active router forwards packets received on one virtual IP and MAC address.
C. The standby router forwards packets when the active router fails.
D. Hosts on the network are configured with multiple gateways for load balancing.
E. Routers in a GLBP group can share multiple virtual MAC addresses.
Q95. Which two message types allow PIM snooping to forward multicast traffic? (Choose two.)
A. hello messages
B. leave messages
C. membership query messages
D. bidirectional PIM DF election messages
Q96. Refer to the exhibit.
Which command can you enter to resolve this error message on a peer router?
A. username <username> password <password>
B. ppp chap <hostname>
C. aaa authorization exec if-authenticated
D. aaa authorization network if-authenticated
Q97. Which two statements about DHCP snooping are true? (Choose two.)
A. It is implemented on a per-VLAN basis.
B. It filters invalid DHCP messages.
C. The binding database logs trusted and untrusted hosts with leased IP addresses.
D. Interfaces are trusted by default.
E. It uses the LFIB to validate requests from untrusted hosts.
Q98. What are the three variants of NTPv4? (Choose three.)
Q99. Which three protocols can use enhanced object tracking? (Choose three.)
The Enhanced Object Tracking feature separates the tracking mechanism from HSRP and creates a separate standalone tracking process that can be used by other processes and HSRP. This feature allows tracking of other objects in addition to the interface line-protocol state. A client process such as HSRP, Virtual Router Redundancy Protocol (VRRP), or Gateway Load Balancing Protocol (GLBP), can register its interest in tracking objects and then be notified when the tracked object changes state.
Q100. Which data plane protocol does EIGRP Over the Top use?
The EIGRP Over the Top solution can be used to ensure connectivity between disparate Enhanced Interior Gateway Routing Protocol (EIGRP) sites. This feature uses EIGRP on the control plane and Locator ID Separation Protocol (LISP) encapsulation on the data plane to route traffic across the underlying WAN architecture. EIGRP is used to distribute routes between customer edge (CE) devices within the network, and the traffic forwarded across the WAN architecture is LISP encapsulated. Therefore, to connect disparate EIGRP sites, you must configure the neighbor command with LISP encapsulation on every CE in the network.