Cisco 400-101 exam braindumps covers the core requirements appearing in the 400-101 real test. The achievement ratio will probably be enhanced with the aid associated with 400-101 certification practice questions and answers, along with the confidence will be boosted accordingly. You may definitely get through the Cisco Cisco 400-101 exam. Or else, we offer full refund or perhaps another free Cisco 400-101 product for you. Dont get stressed about the 400-101 actual exam. As long as a person prepare that by each of our Cisco practice demos step simply by step, you are going to be certainly pass. Dont wait regarding too long, change your career and change your lifetime.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Cisco 400-101 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/400-101-exam-dumps.html
2021 Apr 400-101 exams
Q331. Which two message types allow PIM snooping to forward multicast traffic? (Choose two.)
A. hello messages
B. leave messages
C. membership query messages
D. bidirectional PIM DF election messages
Answer: A,D
Q332. Refer to the exhibit.
All switches are Cisco switches. Assume that Cisco Discovery Protocol is enabled only on switches A and C.
Which information is returned when you issue the command show cdp neighbors on switch C?
A. a limited amount of information about switch B
B. no neighbor details will be returned
C. neighbor details for switch B
D. neighbor details for switch A
E. neighbor details for switch C
Answer: B
Explanation:
CDP is used to discover information on directly connected neighbors only, so in this case SwitchC would only be able to obtain CDP information from SwitchB. However, since SwitchB is not running CDP then no neighbor information will be seen on SwitchC. Same goes for Switch A also in this topology.
Q333. Refer to the exhibit.
Which feature can R1 use to fail over from R2 to R3 if the address for R2 becomes unavailable?
A. object tracking
B. HSRP
C. GLBP
D. LACP
Answer: A
Explanation:
The object tracking feature allows you to create a tracked object that multiple clients can use to modify the client behavior when a tracked object changes. Several clients register their interest with the tracking process, track the same object, and take different actions when the object state changes.
Clients include the following features:
. Embedded Event Manager (EEM)
. Gateway Load Balancing Protocol (GLBP)
. Hot Standby Redundancy Protocol (HSRP)
. Virtual port channel (vPC)
. Virtual Router Redundancy Protocol (VRRP)
The object tracking monitors the status of the tracked objects and communicates any changes made to interested clients. Each tracked object is identified by a unique number that clients can use to configure the action to take when a tracked object changes state.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx-os/unicast/configuration/guide/l3_cli_nxos/l3_object.html
Q334. Refer to the exhibit.
Which statement about this device configuration is true?
A. The NMS needs a specific route configured to enable it to reach the Loopback0 interface of the device.
B. The ifindex of the device could be different when the device is reloaded.
C. The device will allow anyone to poll it via the public community.
D. The device configuration requires the AuthNoPriv security level.
Answer: B
Explanation:
One of the most commonly used identifiers in SNMP-based network management applications is the Interface Index (ifIndex) value. IfIndex is a unique identifying number associated with a physical or logical interface. For most software, the ifIndex is the name of the interface. Although relevant RFCs do not require that the correspondence between particular ifIndex values and their interfaces be maintained across reboots, applications such as device inventory, billing, and fault detection depend on this correspondence. Consider a situation where a simple monitoring software (like MRTG) is polling the interface statistics of the router specific serial interface going to the internet.
As an example, you could have these conditions prior to re-initialization:
physical port ifIndex
ethernet port
tokenring port
2
serial port
3
Therefore, the management application is polling the ifIndex 3, which corresponds to the serial port.
After the router re-initialization (reboot, reload and so on) the conditions change to something similar to this:
physical port
ifIndex
ethernet port
3
tokenring port
1
serial port
2
The management application continues polling the ifIndex 3, which corresponds now to the ethernet port. Therefore, if the management application is not warned by a trap, for example, that the router has been rebooted, the statistics polled could be completely wrong.
Reference: http://www.cisco.com/c/en/us/support/docs/ip/simple-network-management-protocol-snmp/28420-ifIndex-Persistence.html
Q335. DRAG DROP
Drag and drop the method for refreshing BGP prefixes on the left to the corresponding description on the right.
Answer:
Renew 400-101 test:
Q336. Which additional feature must be enabled on a switch to allow PIM snooping to function correctly?
A. IGMP snooping
B. port security
C. storm control
D. dynamic ARP inspection
Answer: A
Q337. Which two statements about 802.1Q tunneling are true? (Choose two.)
A. It requires a system MTU of at least 1504 bytes.
B. The default configuration sends Cisco Discovery Protocol, STP, and VTP information.
C. Traffic that traverses the tunnel is encrypted.
D. It is supported on private VLAN ports.
E. MAC-based QoS and UDLD are supported on tunnel ports.
F. Its maximum allowable system MTU is 1546 bytes.
Answer: A,E
Q338. Which two options are BGP attributes that are updated when router sends an update to its eBGP peer? (Choose two.)
A. weight
B. local preference
C. AS_path
D. next-hop
Answer: C,D
Explanation:
AS_Path describes the inter-AS path taken to reach a destination. It gives a list of AS Numbers traversed when reaching to a destination. Every BGP speaker when advertising a route to a peer will include its own AS number in the NLRI. The subsequent BGP speakers who advertise this route will add their own AS number to the AS_Path, the subsequent AS numbers get prepended to the list. The end result is the AS_Path attribute is able to describe all the autonomous systems it has traversed, beginning with the most recent AS and ending with the originating AS.
NEXT_HOP Attribute specifies the next hop IP address to reach the destination advertised in the NLRI. NEXT_HOP is a well-known mandatory attribute that is included in every eBGP update.
Reference: http://netcerts.net/bgp-path-attributes-and-the-decision-process/
Q339. What are the three primary components of NetFlow? (Choose three.)
A. Flow caching
B. A flow collector
C. The data analyzer
D. Flow sequence numbers
E. Cisco Express Forwarding
F. Multicast
Answer: A,B,C
Explanation:
NetFlow includes three key components that perform the following capabilities:
. Flow caching analyzes and collects IP data flows entering router or switch interfaces and prepares data for export. It enables the accumulation of data on flows with unique characteristics, such as IP addresses, application, and CoS.
. FlowCollector and Data Analysis captures exported data from multiple routers and filters and aggregates the data according to customer policies, and then stores this summarized or aggregated data. Users can leverage Cisco NetFlow collector as a flow collector, or they can opt for a variety of third-party partner products. A Graphical user interface displays and analyzes NetFlow data collected from FlowCollector files. This allows users to complete near-real-time visualization or trending analysis of recorded and aggregated flow data. Users can specify the router and aggregation scheme and desired time interval.
Reference: http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-netflow/product_data_sheet0900aecd80173f71.html
Q340. Which two statements about BGP loop prevention are true? (Choose two.)
A. Advertisements from PE routers with per-neighbor SOO configured include a Site of Origin value that is equal to the configured value of the BGP peering.
B. If the configured Site of Origin value of a BGP peering is equal to the Site of Origin value on a route it receives, route advertisement is blocked to prevent a route loop.
C. AS-override aids BGP loop prevention, but alternate loop prevention mechanisms are also necessary.
D. Advertisements from the neighbors a BGP peering include a Site of Origin value that is separate from the configured value of the BGP peering.
E. If the configured Site of Origin value of a BGP peering is greater than the Site of Origin value on a route it receives, route advertisement is blocked to prevent a route loop.
F. If the configured Site of Origin value of a BGP peering is equal to the Site of Origin value on a route it receives, route advertisement is permitted.
Answer: A,B