Our Cisco Cisco exam questions and answers are revised and verified for numerous times before publishing. All the professionals spare no efforts to provide the clients with best and latest Cisco 400-101 training materials. A great number of people possess got the admired Cisco certificate. Consequently we have full confidence in offer your wonderful achievement after using our Cisco 400-101 exam questions and answers. Limited access to our own free updated Cisco 400-101 exam merchandise within 120 days. Youd greater keep visiting Examcollection web site to download the actual recently upgraded Cisco 400-101 study components. Seek the Cisco 400-101 study guide pertaining to help, or perhaps email us. Your issues will be solved timely.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Cisco 400-101 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/400-101-exam-dumps.html
2021 Mar 400-101 test engine
Q211. Refer to the exhibit.
While reviewing a log file on a router with this NTP configuration, you note that the log entries of the router display a different time than the NTP time.
Which action can you take to correct the problem?
A. Add the localtime keyword to the service timestamps log datetime statement.
B. Add the msec keyword to the service timestamps log datetime statement.
C. Add the statement ntp broadcast to the NTP configuration of the neighboring router.
D. Configure the router to be the NTP master.
E. Remove the datetime keyword from the service timestamps log datetime statement.
Answer: A
Q212. Refer to the exhibit.
While troubleshooting high CPU utilization on one of your Cisco Catalyst switches, you find that the issue is due to excessive flooding that is caused by STP. What can you do to prevent this issue from happening again?
A. Disable STP completely on the switch.
B. Change the STP version to RSTP.
C. Configure PortFast on port-channel 1.
D. Configure UplinkFast on the switch.
E. Configure PortFast on interface Gi0/15.
Answer: E
Explanation:
Topology Changes (TC) should be a rare event in a well-configured network. When a link on a switch port goes up or down, there is eventually a TC, once the STP state of the port is changing to or from forwarding. When the port is flapping, this would cause repetitive TCs and flooding.
Ports with the STP portfast feature enabled will not cause TCs when going to or from the forwarding state. The configuration of portfast on all end-device ports (such as printers, PCs, and servers) should limit TCs to a low amount and is highly recommended.
Reference: http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/28943-170.html
Q213. Which option describes what the default RT filter indicates when you implement the BGP RT constrained route distribution feature?
A. A peer receives only a default route for each VRF.
B. A peer receives all routes, regardless of the RT value.
C. A peer receives routes only for RTs that are used on that router.
D. A peer receives no routes, regardless of the RT value.
Answer: B
Q214. Which two statements about redistribution are true? (Choose two.)
A. EIGRP requires the route to have a default metric defined.
B. EIGRP and OSPF use their router IDs to prevent loops.
C. When OSPF is redistributed into IS-IS, the default metric must be configured under the IS-IS process.
D. When traffic is redistributed into OSPF, the subnets command is needed to redistribute classful subnets.
E. The default seed metric for OSPF redistributed routes is 30.
Answer: A,B
Q215. Which problem can result when private AS numbers are included in advertisements that are sent to the global Internet BGP table?
A. The prefixes sent with private AS numbers are always discarded on the Internet.
B. The prefixes sent with private AS numbers are always tagged as invalid on the Internet.
C. The prefixes sent with private AS numbers lack uniqueness, which can lead to a loss of connectivity.
D. The prefixes sent with private AS numbers are sometimes tagged as invalid on the Internet.
Answer: C
Explanation:
Private AS numbers are not meant to be used for global Internet BGP routing, as they are assigned locally and can be used by any organization. They are meant to enable BGP within a enterprise or VPN, but since these numbers can be used by any organization they are not unique and could cause connectivity loss if leaked to the Internet.
Renovate 400-101 download:
Q216. Which two statements best describes the difference between active mode monitoring and passive mode monitoring? (Choose two.)
A. Active mode monitoring is the act of Cisco PfR gathering information on user packets assembled into flows by NetFlow.
B. Active mode monitoring uses IP SLA probes for obtaining performance characteristics of the current exit WAN link.
C. Passive mode monitoring uses IP SLA to generate probes for the purpose of obtaining information regarding the characteristics of the WAN links.
D. Passive mode monitoring uses NetFlow for obtaining performance characteristics of the exit WAN links.
Answer: B,D
Q217. Refer to the exhibit.
What happens to packets when traffic in the icmp-class class exceeds the policed amount?
A. Packets are discarded and a message is logged.
B. Packets are discarded and a trap is sent to any servers that are configured to receive traps.
C. Packets are discarded silently.
D. Packets are discarded and an inform is sent to any servers that are configured to receive informs.
Answer: C
Explanation:
service-policy {input| output policy-map-name Example:
Router(config-cp)# service-policy input control-plane-policy
Attaches a QoS service policy to the control plane. Note the following points:
. input --Applies the specified service policy to packets received on the control plane.
. output --Applies the specified service policy to packets transmitted from the control plane and enables the router to silently discard packets.
. policy-map-name --Name of a service policy map (created using the policy-mapcommand) to be attached. The name can be a maximum of 40 alphanumeric characters.
In this case, the service policy is set to output, which drops the traffic silently per above.
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/qos_plcshp/configuration/15-mt/qos-plcshp-15-mt-book/qos-plcshp-ctrl-pln-plc.html
Q218. Which two options are advantages of NetFlow version 9 over NetFlow version 5? (Choose two.)
A. NetFlow version 9 adds support for IPv6 headers.
B. NetFlow version 9 adds support for MPLS labels.
C. NetFlow version 9 adds support for the Type of Service field.
D. NetFlow version 9 adds support for ICMP types and codes.
Answer: A,B
Explanation:
NetFlow version 9 includes support for all of these fields that version 5 supports and can optionally include additional information such as Multiprotocol Label Switching (MPLS) labels and IPv6 addresses and ports.
Q219. Which mechanism does Cisco recommend for CE router interfaces that face the service provider for an EVPL circuit with multiple EVCs and multiple traffic classes?
A. HCBWFQ
B. LLQ
C. tail drop
D. WRED
Answer: A
Explanation:
In a simple handoff, packets may be discarded in the service provider network, either because of congestion on a link without an appropriate QoS policy or because of a policer QoS configuration on the service provider network that serves to rate limit traffic accessing the WAN core. To address these issues, QoS on the CE device is applied at a per-port level. A QoS service policy is configured on the outside Ethernet interface, and this parent policy includes a shaper that then references a second or subordinate (child) policy that enables queueing within the shaped rate. This is called a hierarchical CBWFQ (HCBWFQ) configuration.
Reference: http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/WAN_and_MAN/Ethernet_Acces s_for_NG_MAN_WAN_V3-1_external.html
Q220. In which two modes do IPv6-in-IPv4 tunnels operate? (Choose two.)
A. tunnel mode
B. transport mode
C. 6to4 mode
D. 4to6 mode
E. ISATAP mode
Answer: C,E
Explanation:
*There are 5 tunneling solution in IPv6:*
*1. Using the “Tunnel mode ipv6ip”, in this case the tunnel source and destination are configured with IPv4 addressing and the tunnel interface is configured with IPv6. This will use protocol 41. This is used for IPv6/IPv4.
*
R1(config)#int tunnel 1
R1(config-if)#ipv6 address 12:1:12::1/64
R1(config-if)#tunnel source 10.1.12.1
R1(config-if)#tunnel destination 10.1.12.2
R1(config-if)#*tunnel mode ipv6ip*
*
2. Using the “Tunnel mode gre ipv6, in this case the tunnel source and destination are all configured with IPv6 addressing. This is used for IPv6/IPv6.
*
BB1(config)#int tunnel 1
BB1(config-if)#ipv6 address 121:1:121::111/64
BB1(config-if)#tunnel source 10:1:111::111
BB1(config-if)#tunnel destination 10:1:112::112
BB1(config-if)#*tunnel mode gre ipv6*
*3.
In this case, the third type, the tunnel mode is NOT used at all, note that the tunnel interface is configured with IPv6 and the tunnel source and destination is configured with IPv4 but no mention of tunnel mode. This configuration will use protocol 47. This is used for IPv6/IPv4.
*
R1(config)#int tunnel 13
R1(config-if)#ipv6 address 13:1:13::1/64
R1(config-if)#tunnel source 10.1.13.1
R1(config-if)#tunnel destination 10.1.13.3
*4. Note in this case a special addressing is assigned to the tunnel interface which is a concatenation of a reserved IPv6 address of 2002followed by the translated IPv4 address of a given interface on the router. In this configuration ONLY the tunnel source address is used and since the tunnel is automatic, the destination address is NOT configured. The tunnel mode is set to “Tunnel mode ipv6ip 6to4. Note the IPv4 address of 10.1.1.1 is translated to 0A.01.01.01 and once concatenated, it will be “2002:0A01:0101: or 2002:A01:101. This is used for IPv6/IPv4.
*
R1(config)#interface Tunnel14
R1(config-if)#ipv6 address 2002:A01:101::/128
R1(config-if)#tunnel source 10.1.1.1
R1(config-if)#*tunnel mode ipv6ip 6to4*
*5. ISATAP, ISATAP works like 6to4 tunnels, with one major difference, it uses a special IPv6 address which is formed as follows: *
*In this tunnel mode, the network portion can be any IPv6 address, whereas in 6to4 it had to start with 2002.*
*Note when the IPv6 address is assigned to the tunnel interface, the “eui-64 is used, in this case the host portion of the IPv6 address starts with “0000.5EFE” and then the rest of the host portion is the translated IPv4 address of the tunnel’s source IPv4 address. This translation is performed automatically unlike 6to4. This is used for IPv6/IPv4.*
R4(config)#int tunnel 46
R4(config-if)#ipv6 address 46:1:46::/64 eui-64
R4(config-if)#tunnel source 10.44.44.44
R4(config-if)#*tunnel mode ipv6ip ISATAP*