Exam Code: 400-101 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CCIE Routing and Switching (v5.0)
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass 400-101 Exam.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Cisco 400-101 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/400-101-exam-dumps.html
2021 Apr 400-101 practice exam
Q301. Which variable in an EEM applet is set when you use the sync yes option?
A. $_cli_result
B. $_result
C. $_string_result
D. $_exit_status
Answer: D
Explanation:
The CLI event detector screens CLI commands for a regular expression match. When a match is found, an event is published. The match logic is performed on the fully expanded CLI command after the command is successfully parsed and before it is executed. The CLI event detector supports three publish modes:
. Synchronous publishing of CLI events--The CLI command is not executed until the EEM policy exits, and the EEM policy can control whether the command is executed. The read/write variable, _exit_status, allows you to set the exit status at policy exit for policies triggered from synchronous events. If _exit_status is 0, the command is skipped, if _exit_status is 1, the command is run.
. Asynchronous publishing of CLI events--The CLI event is published, and then the CLI command is executed.
. Asynchronous publishing of CLI events with command skipping--The CLI event is published, but the CLI command is not executed.
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/eem/command/eem-cr-
book/eem-cr-e1.html
Q302. Refer to the exhibit.
Which technology does the use of bi-directional BPDUs on all ports in the topology support?
A. RSTP
B. MST
C. Bridge Assurance
D. Loop Guard
E. Root Guard
F. UDLD
Answer: C
Explanation:
Spanning Tree Bridge Assurance
. Turns STP into a bidirectional protocol
. Ensures spanning tree fails “closed” rather than “open”
. If port type is “network” send BPDU regardless of state
. If network port stops receiving BPDU it’s put in BA-inconsistent state
Bridge Assurance (BA) can help protect against bridging loops where a port becomes designated because it has stopped receiving BPDUs. This is similar to the function of loop guard.
Reference: http://lostintransit.se/tag/convergence/
Q303. Refer to the exhibit.
Which two statements about the EEM applet configuration are true? (Choose two.)
A. The EEM applet runs before the CLI command is executed.
B. The EEM applet runs after the CLI command is executed.
C. The EEM applet requires a case-insensitive response.
D. The running configuration is displayed only if the letter Y is entered at the CLI.
Answer: A,D
Explanation:
sync Indicates whether the policy should be executed synchronously before the CLI command executes.
. If the yes keyword is specified, the policy will run synchronously with the CLI command.
. If the no keyword is specified, the policy will run asynchronously with the CLI command.
nocase
(Optional) Specifies case insensitive comparison.
Here we see that the sync knob was enabled so A is correct. However, C is not correct as the nocase argument was not used, so the applet is configured to display the config only if a capital Y is issued.
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/eem/command/eem-cr-book/eem-cr-a2.html
Q304. Which two statements about the C-bit and PW type are true? (Choose two.)
A. The C-bit is 1 byte and the PW type is 15 bytes.
B. The PW type indicates the type of pseudowire.
C. The C-bit is 3 bits and the PW type is 10 bits.
D. The C-bit set to 1 indicates a control word is present.
E. The PW type indicates the encryption type.
Answer: B,D
Explanation:
The control word carries generic and Layer 2 payload-specific information. If the C-bit is set to 1, the advertising PE expects the control word to be present in every pseudowire packet on the pseudowire that is being signaled. If the C-bit is set to 0, no control word is expected to be present. Pseudowire Type—PW Type is a 15-bit field that represents the type of pseudowire.
Reference: http://www.ciscopress.com/articles/article.asp?p=386788&seqNum=2
Q305. Which regular expression will only allow prefixes that originated from AS 65000 and that are learned through AS 65001?
A. ^65000_65001$
B. 65000_65001$
C. ^65000_65001
D. ^65001_65000$
Answer: D
Explanation:
The following table lists the regular expressions and their meanings:
+------------------------------------------------------+
| CHAR | USAGE |
+------------------------------------------------------|
| ^ | Start of string |
|------|-----------------------------------------------|
| $ | End of string |
|------|-----------------------------------------------|
| [] | Range of characters |
|------|-----------------------------------------------|
| - | Used to specify range ( i.e. [0-9] ) |
|------|-----------------------------------------------|
| ( ) | Logical grouping |
|------|-----------------------------------------------|
| . | Any single character |
|------|-----------------------------------------------|
| * | Zero or more instances |
|------|-----------------------------------------------|
| + | One or more instance |
|------|-----------------------------------------------|
| ? | Zero or one instance |
|------|-----------------------------------------------|
| _ | Comma, open or close brace, open or close |
| | parentheses, start or end of string, or space |
+------------------------------------------------------+
Some commonly used regular expressions include:
+-------------+---------------------------+
| Expression | Meaning |
|-------------+---------------------------|
| .* | Anything |
|-------------+---------------------------|
| ^$ | Locally originated routes |
|-------------+---------------------------|
| ^100_ | Learned from AS 100 |
|-------------+---------------------------|
| _100$ | Originated in AS 100 |
|-------------+---------------------------|
| _100_ | Any instance of AS 100 |
|-------------+---------------------------|
| ^[0-9]+$ | Directly connected ASes |
+-------------+---------------------------+
Reference: http://blog.ine.com/2008/01/06/understanding-bgp-regular-expressions/
Leading 400-101 vce:
Q306. Refer to the exhibit.
Which two statements about this configuration are true? (Choose two.)
A. It allows 172.16.0.0/16 to be distributed into EIGRP.
B. It allows a default route to be distributed into EIGRP.
C. It allows 172.16.0.0/16 and larger subnets to be distributed into EIGRP.
D. It prevents 172.16.0.0/16 from being distributed into EIGRP.
E. It prevents a default route from being distributed into EIGRP.
F. It creates summary routes and injects them into EIGRP.
Answer: A,B
Explanation:
In this example, the prefix list is configured to only allow the two specific routes of 172.16.0.0/16 and the default route. Any other routes will be filtered.
Q307. Which two descriptions of the keying mechanisms that are used to distribute the session keys used in routing authentication are true? (Choose two.)
A. Peer keying creates a unique one-to-one relationship with another peer.
B. Group keying creates a single keying message to multiple peers.
C. Peer keying creates a single keying message to multiple peers.
D. Group keying creates a unique one-to-one relationship with another peer.
E. Group keying creates a full mesh of keying sessions to all devices.
F. Peer keying creates a full mesh of keying sessions to all devices.
Answer: A,B
Q308. Refer to the exhibit.
If a port is configured as shown and receives an untagged frame, of which VLAN will the untagged frame be a member?
A. VLAN 1
B. VLAN 2
C. VLAN 3
D. VLAN 4
Answer: B
Explanation:
When typing: Switch(config-if)#switchport mode?
access Set trunking mode to ACCESS unconditionally
dynamic Set trunking mode to dynamically negotiate access or trunk mode
trunk Set trunking mode to TRUNK unconditionally
and
Switch(config-if)#switchport mode dynamic?
auto Set trunking mode dynamic negotiation parameter to AUTO
desirable Set trunking mode dynamic negotiation parameter to DESIRABLE
So if we configure Fa0/1 as dynamic auto mode, it will not initiate any negotitation but waiting for the other end negotiate to be a trunk with DTP. If the other end does not ask it to become a trunk then it will become an access port. Therefore when using the “show interface fastEthernet0/1 switchport” command we will see two output lines “ Administrative Mode. dynamic auto” and “Operational Mode. static access” Note. To set this port to VLAN 2 as the output above just use one additional command. “switchport access vlan 2”.
Now back to our question, from the output we see that Fa0/1 is operating as an access port on VLAN 2 so if it receive untagged frame it will suppose that frame is coming from VLAN 2.
Q309. Which three protocols can use enhanced object tracking? (Choose three.)
A. HSRP
B. Proxy-ARP
C. VRRP
D. GLBP
E. NTP
F. DHCP
Answer: A,C,D
Explanation:
The Enhanced Object Tracking feature separates the tracking mechanism from HSRP and creates a separate standalone tracking process that can be used by other processes and HSRP. This feature allows tracking of other objects in addition to the interface line-protocol state. A client process such as HSRP, Virtual Router Redundancy Protocol (VRRP), or Gateway Load Balancing Protocol (GLBP), can register its interest in tracking objects and then be notified when the tracked object changes state.
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp/configuration/15-mt/iap-15-mt-book/iap-eot.html
Q310. Refer to the exhibit.
Which two statements are true regarding prefix 10.1.0.0/24? (Choose two.)
A. The prefix is in policy, and Cisco PfR rerouted the traffic via 10.4.5.3 Et0/1 because of an OOP event.
B. Cisco PfR is monitoring the prefix via passive NetFlow mode only.
C. Cisco PfR is monitoring the prefix via active, fast, or active throughput IP SLA probe mode only.
D. The prefix is in policy, and Cisco PfR did not reroute the traffic via 10.4.5.3 Et0/1 because the traffic was previously in policy.
E. Cisco PfR is monitoring the prefix via mode monitor, which provides both NetFlow and IP SLA measurements.
Answer: D,E
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/pfr/command/pfr-cr-book/pfr-s1.html#wp2707728086