[Leading] lead2pass 400-101

400-101 Royal Pack Testengine pdf

100% Actual & Verified — 100% PASS

Unlimited access to the world's largest Dumps library!


Exam Code: 400-101 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CCIE Routing and Switching (v5.0)
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass 400-101 Exam.

2016 Jun 400-101 Study Guide Questions:

Q351. Refer to the exhibit. 

If you change the Spanning Tree Protocol from pvst to rapid-pvst, what is the effect on the interface Fa0/1 port state? 

A. It transitions to the listening state, and then the forwarding state. 

B. It transitions to the learning state and then the forwarding state. 

C. It transitions to the blocking state, then the learning state, and then the forwarding state. 

D. It transitions to the blocking state and then the forwarding state. 

Answer: C 


First, the port will transition to the blocking state, immediately upon the change, then it will transition to the new RSTP states of learning and forwarding. 

Port States 

There are only three port states left in RSTP that correspond to the three possible operational states. The 802.1D disabled, blocking, and listening states are merged into a unique 802.1w discarding state. 

STP (802.1D) Port State 

RSTP (802.1w) Port State 

Is Port Included in Active Topology? 

Is Port Learning MAC Addresses? 






















Drag and drop the argument of the ip cef load-sharing algorithm command on the left to the function it performs on the right. 


Q353. Refer to the exhibit. 

This network is configured with PIM, and the RPF check has failed toward the multicast source. Which two configuration changes must you make to router R3 to enable the RPF check to pass? (Choose two.) 

A. Configure a static multicast route to the multicast source through the tunnel interface. 

B. Configure a static multicast route to the multicast source LAN through the tunnel interface. 

C. Configure a static multicast route to the multicast source LAN through the Ethernet interface. 

D. Remove the command ip prim bidir-enable from the R3 configuration. 

Answer: A,B 

400-101  real exam

Renewal ccie 400-101 vce:

Q354. When you configure the ip pmtu command under an L2TPv3 pseudowire class, which two things can happen when a packet exceeds the L2TP path MTU? (Choose two.) 

A. The router drops the packet. 

B. The router always fragments the packet after L2TP/IP encapsulation. 

C. The router drops the packet and sends an ICMP unreachable message back to the sender only if the DF bit is set to 1. 

D. The router always fragments the packet before L2TP/IP encapsulation. 

E. The router fragments the packet after L2TP/IP encapsulation only if the DF bit is set to 0. 

F. The router fragments the packet before L2TP/IP encapsulation only if the DF bit is set to 


Answer: C,F 


If you enable the ip pmtu command in the pseudowire class, the L2TPv3 control channel participates in the path MTU discovery. When you enable this feature, the following processing is performed: 

– ICMP unreachable messages sent back to the L2TPv3 router are deciphered and the tunnel MTU is updated accordingly. In order to receive ICMP unreachable messages for fragmentation errors, the DF bit in the tunnel header is set according to the DF bit value received from the CE, or statically if the ip dfbit set option is enabled. The tunnel MTU is periodically reset to the default value based on a periodic timer. 

– ICMP unreachable messages are sent back to the clients on the CE side. ICMP unreachable messages are sent to the CE whenever IP packets arrive on the CE-PE interface and have a packet size greater than the tunnel MTU. A Layer 2 header calculationis performed before the ICMP unreachable message is sent to the CE. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/l2tpv325.html 

Q355. Which EIGRP configuration results in subsecond failover outside of the basic routing 

protocol convergence? 

A. bfd all-interfaces 

B. timers active-time disabled 

C. timers active-time 1 

D. timers nsf route-hold 20 

Answer: A 

Q356. Refer to the exhibit. 

What is a possible reason for the IPSec tunnel not establishing? 

A. The peer is unreachable. 

B. The transform sets do not match. 

C. The proxy IDs are invalid. 

D. The access lists do not match. 

Answer: D 


Proxy Identities Not Supported 

This message appears in debugs if the access list for IPsec traffic does not match. 

1d00h: IPSec(validate_transform_proposal): proxy identities not supported 

1d00h: ISAKMP: IPSec policy invalidated proposal 

1d00h: ISAKMP (0:2): SA not acceptable! 

The access lists on each peer needs to mirror each other (all entries need to be reversible). 

This example illustrates this point. 

Peer A 

access-list 150 permit ip 

access-list 150 permit ip host host 

Peer B 

access-list 150 permit ip 

access-list 150 permit ip host host 




Accurate ccie 400-101 vce:

Q357. In which way does the Bridge Assurance mechanism modify the default spanning-tree behavior in an effort to prevent bridging loops? 

A. Received BPDUs are looped back toward the sender to ensure that the link is bidirectional. 

B. If BPDUs are no longer received on a port, the switch immediately sends out a TCN BPDU. 

C. Extended topology information is encoded into all BPDUs. 

D. BPDUs are sent bidirectional on all active network ports, including blocked and alternate ports. 

Answer: D 

Q358. Which two statements about the default SNMP configuration are true? (Choose two.) 

A. The SNMP agent is enabled. 

B. The SNMP trap receiver is configured. 

C. All SNMP notification types are sent. 

D. SNMPv1 is the default version. 

E. SNMPv3 is the default version. 

Answer: C,D 


Default SNMP Configuration 


Default Setting 

SNMP agent 

Enabled SNMP community strings 

Read-Only: Public 

Read-WritE. Private 

Read-Write-all: Secret 

SNMP trap receiver 

None configured 

SNMP traps 

None enabled 

SNMP version 

If no version keyword is present, the default is version 1. 

SNMPv3 authentication 

If no keyword is entered, the default is the noauth (noAuthNoPriv) security level. 

SNMP notification type 

If no type is specified, all notifications are sent. 



Q359. Which two statements about the function of a PIM designated router are true? (Choose two.) 

A. It forwards multicast traffic from the source into the PIM network. 

B. It registers directly connected sources to the PIM rendezvous point. 

C. It sends PIM Join/Prune messages for directly connected receivers. 

D. It sends IGMP queries. 

E. It sends PIM asserts on the interfaces of the outgoing interface list. 

Answer: B,C 


In PIM ASM and SSM modes, the software chooses a designated router (DR) from the routers on each network segment. The DR is responsible for forwarding multicast data for specified groups and sources on that segment. In ASM mode, the DR is responsible for unicasting PIM register packets to the RP. When a DR receives an IGMP membership report from a directly connected receiver, the shortest path is formed to the RP, which may or may not go through the DR. The result is a shared tree that connects all sources transmitting on the same multicast group to all receivers of that group. In SSM mode, the DR triggers (*, G) or (S, G) PIM join messages toward the RP or the source. The path from the receiver to the source is determined hop by hop. The source must be known to the receiver or the DR. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx-os/multicast/configuration/guide/n7k_multic_cli_5x/pim.html#wp1054047 

Q360. Which two options are benefits of EIGRP OTP? (Choose two.) 

A. It allows EIGRP routers to peer across a service provider without the service provider involvement. 

B. It allows the customer EIGRP domain to remain contiguous. 

C. It requires only minimal support from the service provider. 

D. It allows EIGRP neighbors to be discovered dynamically. 

E. It fully supports multicast traffic. 

F. It allows the administrator to use different autonomous system numbers per EIGRP domain. 

Answer: A,B 


EIGRP Over the Top (OTP) allows EIGRP routers to peer across a service provider infrastructure without the SP’s involvement. In fact with OTP, the provider won’t see customer routes at all. EIGRP OTP acts as a provider-independent overlay that transports customer data between the customer’s routers. To the customer, the EIGRP domain is contiguous. A customer’s EIGRP router sits at the edge of the provider cloud, and peers with another EIGRP router a different location across the cloud. Learned routes feature a next hop of the customer router — not the provider. Good news for service providers is that customers can deploy EIGRP OTP with their involvement 

Reference: http://ethancbanks.com/2013/08/01/an-overview-of-eigrp-over-the-top-otp/ 

see more CCIE Routing and Switching (v5.0)