The speedy and one on one way towards Cisco Cisco 400-101 certification is to find help through Exambible. The totally free research guide, practice demos, Pdf files along with test powerplant will help you get good results easily along with smoothly. Log upon Exambible.com along with select the most suitable Cisco Cisco prep package by yourself. You will obtain the pack after we all receive your payment. Download the actual test questions along with answers and print them, in order to prepare to the Cisco 400-101 real exam together with your own type and your own speed. After reviewing the actual theoretical materials, you can attempt yourself using the test powerplant. Take a simulated examination paper every day, and you may make great progress after a small period of time.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 400-101 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/400-101-exam-dumps.html

2021 Mar 400-101 free download

Q191. Which two statements about IP SLAs are true? (Choose two.) 

A. They are Layer 2 transport independent. 

B. Statistics are collected and stored in the RIB. 

C. Data for the delay performance metric can be collected both one-way and round-trip. 

D. Data can be collected with a physical probe. 

E. They are used primarily in the distribution layer. 

Answer: A,E 


Q192. Refer to the exhibit. 

Traffic from CE1 to CE2 is traveling through the core instead of through R1. All the PE routers have a similar configuration, and BGP peering and extended-community meshing are configured correctly. 

Which configuration change routes the traffic through R1? 

A) 

B) 

C) 

D) 

A. Exhibit A 

B. Exhibit B 

C. Exhibit C 

D. Exhibit D 

Answer:


Q193. Which option describes a limitation of Embedded Packet Capture? 

A. It can capture data only on physical interfaces and subinterfaces. 

B. It can store only packet data. 

C. It can capture multicast packets only on ingress. 

D. It can capture multicast packets only on egress. 

Answer:

Explanation: 

Restrictions for Embedded Packet Capture 

. In Cisco IOS Release 12.2(33)SRE, EPC is supported only on 7200 platform. 

. EPC only captures multicast packets on ingress and does not capture the replicated packets on egress. 

. Currently, the capture file can only be exported off the device; for example, TFTP or FTP servers and local disk. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/epc/configuration/15-mt/epc-15-mt-book/nm-packet-capture.html 


Q194. DRAG DROP 

Drag and drop the RIP configuration command on the left to the function it performs on the right. 

Answer: 


Q195. Refer to the exhibit. 

NHRP registration is failing; what might be the problem? 

A. invalid IP addressing 

B. fragmentation 

C. incorrect NHRP mapping 

D. incorrect NHRP authentication 

Answer:

Explanation: 

Configuring an authentication string ensures that only routers configured with the same string can communicate using NHRP. Therefore, if the authentication scheme is to be used, the same string must be configured in all devices configured for NHRP on a fabric 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_4/ip_addr/configuration/guide/hadnhrp.html#w p1055432 


Improved 400-101 test question:

Q196. Which two statements best describe the difference between active mode monitoring and passive mode monitoring? (Choose two.) 

A. Passive mode monitoring uses IP SLA to generate probes for the purpose of obtaining information regarding the characteristics of the WAN links. 

B. Active mode monitoring is the act of Cisco PfR gathering information on user packets assembled into flows by NetfFow. 

C. Active mode monitoring uses IP SLA probes for obtaining performance characteristics of the current exit WAN link. 

D. Passive mode monitoring uses NetFlow for obtaining performance characteristics of the exit WAN links. 

Answer: C,D 

Explanation: 

. Passive and Active Monitoring 

Passive monitoring is the act of OER gathering information on user packets assembled into flows by NetFlow. OER, when enabled, automatically enables NetFlow on the managed interfaces on the border routers. By aggregating this information on the border routers and periodically reporting the collected data to the master controller, the network prefixes and applications in use can automatically be learned. Additionally, attributes like throughput, reachability, loading, packet loss, and latency can be deduced from the collected flows. Active monitoring is the act of generating IP SLA probes to generate test traffic for the purpose of obtaining information regarding the characteristics of the WAN links. Active probes can either be implicitly generated by OER when passive monitoring has identified destination hosts, or explicitly configured by the network manager in the OER configuration. 

Reference: http://products.mcisco.com/en/US/docs/solutions/Enterprise/WAN_and_MAN/Transport_div ersity/Transport_Diversity_PfR.html#wp199209 


Q197. You are configuring a DMVPN spoke to use IPsec over a physical interface that is located within a VRF. For which three configuration sections must you specify the VRF name? (Choose three.) 

A. the ISAKMP profile 

B. the crypto keyring 

C. the IPsec profile 

D. the IPsec transform set 

E. the tunnel interface 

F. the physical interface 

Answer: B,E,F 

Explanation: 

ip vrf forwardingvrf-name 

Example: 

Router(config-if)# ip vrf forwarding green 

Associates a virtual private network (VPN) routing and forwarding (VRF) instance with an interface or subinterface. 

. vrf-name is the name assigned to a VRF. 

Router(config-if)# tunnel vrfvrf-name 

Example: 

Router(config-if)# tunnel vrf finance1 

Associates a VPN routing and forwarding (VRF) instance with a specific tunnel destination. vrf-name is the name assigned to a VRF. 

Router(config)# crypto keyringkeyring-name [vrf fvrf-name] 

Defines a crypto keyring to be used during IKE authentication and enters keyring configuration mode. 

. keyring-name—Name of the crypto keyring. 

. fvrf-name—(Optional) Front door virtual routing and forwarding (FVRF) name to which the keyring will be referenced. fvrf-name must match the FVRF name that was defined during virtual routing and forwarding (VRF) configuration 


Q198. Which three modes are valid PfR monitoring modes of operation? (Choose three.) 

A. route monitor mode (based on BGP route changes) 

B. RMON mode (based on RMONv1 and RMONv2 data) 

C. passive mode (based on NetFlow data) 

D. active mode (based on Cisco IP SLA probes) 

E. fast mode (based on Cisco IP SLA probes) 

F. passive mode (based on Cisco IP SLA probes) 

Answer: C,D,E 

Explanation: 

Modes are: 

Mode monitor passive 

Passive monitoring is the act of PfR gathering information on user packets assembled into flows by Netflow. Passive monitoring is typically only recommended in Internet edge deployments because active probing is ineffective because of security policies that block probing. PfR, when enabled, automatically enables Netflow on the managed interfaces on the Border Routers. By aggregating this information on the Border Routers and periodically reporting the collected data to the Master Controller, the network prefixes and applications in use can automatically be learned. 

Mode monitor active 

Active monitoring is the act of generating Cisco IOS IP Service Level Agreements (SLAs) probes to generate test traffic for the purpose of obtaining information regarding the characteristics of the WAN links. PfR can either implicitly generates active probes when passive monitoring has identified destination hosts, or the network manager can explicitly configured probes in the PfR configuration. When jitter probes are used (common use case), Target Discovery is used to learn the respond address and to automatically generate the probes. 

Mode monitor Fast 

This mode generates active probes through all exists continuously at the configured probe frequency. This differs from either active or both modes in that these modes only generate probes through alternate paths (exits) in the event the current path is out-of-policy. 

Reference: http://docwiki.cisco.com/wiki/PfR:Technology_Overview#Mode_monitor_passive 


Q199. Which EIGRP packet types are sent as unicast packets? 

A. hello, update, query 

B. query, SIA query, reply 

C. SIA query, reply, ACK 

D. query, SIA query, SIA reply 

Answer:


Q200. Which two statements about PBR route maps are true? (Choose two.) 

A. They can use extended ACLs to identify traffic. 

B. They can route unicast traffic without interface-level classification. 

C. They can be applied to both ingress and egress traffic. 

D. They can classify traffic based on prefix-lists. 

E. They can set the metric and IP precedence bits. 

Answer: A,B