400-101 | Refined CCIE Routing and Switching 400-101 exam question


P.S. 100% Correct 400-101 class are available on Google Drive, GET MORE: https://drive.google.com/open?id=10qRl3c2aPM7jDirL_NepQ9ytoJQZm2pM


New Cisco 400-101 Exam Dumps Collection (Question 14 - Question 23)

New Questions 14

Which statement about passive interfaces is true?

A. The interface with the IS-IS passive interface configuration sends the IP address of that interface in the link-state protocol data units

B. The interface with the EIGRP passive interface configuration ignores routes after the exchange of hello packets.

C. The interface with the OSPF passive interface configuration appears as a not-so-stubby network.

D. Passive interface can be configured on the interface for IS-IS.

Answer: A

New Questions 15

Refer to the exhibit.

Router A and B are the edge device at two different sites as shown. The two edge devices use public addresses on their WAN interfaces, and both sites use RFC1918 for all

other addresses.if routers A and B have established an IPsec tunnel, which statement about the

network environment must be true?

A. Router A1 and Router b1 are using NAT translation to allow private-address traffic to traverse the tunnel.

B. The tunnel terminates on the ISP routers.

C. Each site is capable of routing private addressing over the IPsec tunnel.

D. Router A and router B are using BGP to share routes between the two sites.

Answer: C

New Questions 16

Which feature prevents multicast flooding to routers on a common VLAN that are not a part of the multicast distribution tree for the particular group?

A. IGMP Snooping Querier

B. PIM Snooping

C. IGMP Proxy

D. PIM-SM

Answer: B

New Questions 17

Refer to the exhibit.

You must complete the configuration on R1 so that a maximum of three links can &e used and fragmentation is supported.

You must complete the configuration on R1 so that a maximum of three links can be used and fragmentation is supported.

Which additional configuration accomplishes this task?

A. interface Multilink19

ip address 192.168.1.1 255.255.255.0

ppp multilink

ppp multilink group 19

ppp multilink links minimum 1

ppp multilink links maximum 3 ppp multilink interleave

B. interface Multilink19

ip address 192.168.1.1 255.255.255.0

ppp multilink

ppp multilink group 19

ppp multilink links maximum 3 ppp multilink fragment delay 20

C. interface Multilink19

ip address 192.168.1.1 255.255.255.0

ppp multilink

ppp multilink group 19

ppp multilink links maximum 3 ppp multilink fragment delay 20 ppp multilink interleave

D. interface Multilink19

ip address 192.168.1.1 255.255.255.252

ppp multilink

ppp multilink group 19

ppp multilink links maximum 3 ppp multilink interleave

Answer: A

Explanation:

The u201cppp multilink interleaveu201d command is needed to enable link fragmentation and Interleaving (LFI). The Cisco IOS Link Fragmentation and Interleaving (LFI) feature uses Multilink PPP (MLP). MLP provides a method of splitting, recombining, and sequencing datagrams across multiple logical data links. MLP allows packets to be fragmented and the fragments to be sent at the same time over multiple point-to-point links to the same remote address.

ppp multilink links maximum

To limit the maximum number of links that Multilink PPP (MLP) can dial for dynamic allocation, use the ppp multilink links maximum command in interface configuration mode.

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/qos/configuration/guide/fqos_c/qcflfi.html

New Questions 18

Refer to the exhibit.

Which BGP feature is being used?

A. graceful shutdown

B. graceful restart

C. PIC

D. fast session deactivation

Answer: D

New Questions 19

What is the main function of VRF-lite?

A. To segreagate multiple routing tables on a single device.

B. To connect different autonomous systems together to share routes.

C. To allow device to use lables to make layer 2 path decisions.

D. To route IPv6 traffic across an IPv4 backbone.

Answer: A

New Questions 20

which action must you take to configure encryption for a dynamic VPN ?

A. Configure an FQDN identity in the crypto key string.

B. Configure an FQDN on the router.

C. Configure an FQDN peer in the crypto profile.

D. Configure an FQDN in the crypto key string.

Answer: A

New Questions 21

What is the default behavior for a manual summary route when a component route of the summary disappears?

A. Regardless of the metric of the component route ,the metric of the summary is unchanged in order to keep stability

B. If the component route previously had the best composite metric, the same summary metric is retained for stability /

C. If the component route previously had the best composite metric, the metric of the summary changes to the next-best composite metric

D. If the component route previously dis not have the best composite metric, the summary metric is updated and updates are sent to peers

Answer: A

New Questions 22

Which feature must be enabled so that an IS-IS single topology can support IPv6 traffic?

A. extended metrics

B. adjacency checking

C. new-style TLVs only

D. both new-and old-style TLVs

E. old-style TLVs only

Answer: C

New Questions 23

Which technology can be used to prevent flooding of ipv6 multicast traffic on a switch?

A. MLD filtering

B. IGMP snooping

C. MLD snooping

D. IGMP filtering

Answer: C

Recommend!! Get the 100% Correct 400-101 dumps in VCE and PDF From Dumpscollection, Welcome to download: http://www.dumpscollection.net/dumps/400-101/ (New 911 Q&As Version)