♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Cisco 400-101 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/400-101-exam-dumps.html
2021 Apr 400-101 pdf exam
Q151. Refer to the exhibit.
What is the PHB class on this flow?
A. EF
B. none
C. AF21
D. CS4
Answer: D
Explanation:
This command shows the TOS value in hex, which is 80 in this case. The following chart shows some common DSCP/PHB Class values:
Service
DSCP value
TOS value
Juniper Alias
TOS hexadecimal
DSCP - TOS Binary
Premium IP
46
184
ef
B8
101110 - 101110xx
LBE
8
32
cs1
20
001000 - 001000xx
DWS
32
128
cs4
80
100000 - 100000xx
Network control
48
192
cs6
c0
110000 - 110000xx
Network control 2
56
224
cs7
e0
111000 - 111000xx
Reference: http://www.tucny.com/Home/dscp-tos
Q152. Refer to the exhibit.
Which two statements about this configuration are true? (Choose two.)
A. Spoke devices will be dynamically added to the NHRP mappings.
B. The next-hop server address must be configured to 172.168.1.1 on all spokes.
C. The next-hop server address must be configured to 192.168.1.1 on all spokes.
D. R1 will create a static mapping for each spoke.
Answer: A,C
Explanation:
NHRP is a client/server model protocol which is defined by RFC2332. The hub is considered to be the Next Hop Server (NHS) and the spokes are considered to be the Next Hop Client (NHC). The hub must be configured as the next-hop server. NHRP provides a mapping between the inside and outside address of a tunnel endpoint. These mappings can be static or dynamic. In a dynamic scenario, a next-hop server (NHS) is used to maintain a list of possible tunnel endpoints. Each endpoint using the NHS registers its own public and private mapping with the NHS. The local mapping of the NHS must always be static. It is important to note that the branch points to the inside or protected address of the NHS server. This scenario is an example of dynamic mappings.
Reference: http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/WAN_and_MAN/DMVPDG/DMV PN_2_Phase2.html
Q153. Which two statements about the max-age time in IS-IS are true? (Choose two.)
A. The IS-IS max-age time is 20 minutes by default.
B. The IS-IS max-age time is 60 minutes by default.
C. The IS-IS max-age time increments from zero to max-age.
D. The IS-IS max-age time decrements from max-age to zero.
Answer: A,D
Q154. Which statement about BGP and diverse path advertisement is true?
A. The BGP best-path selection must be disabled.
B. The BGP best-path selection algorithm has been changed to always ignore the IGP metric.
C. The BGP best-path selection algorithm has been changed so that two BGP paths can be flagged as best in the BGP table.
D. The BGP best-path selection algorithm has not been changed.
E. The BGP best-path selection is disabled for BGP routes for which the feature is enabled.
Answer: D
Explanation:
The BGP Diverse Path Using a Diverse-Path Route Reflector feature allows BGP to distribute an alternative path other than the best path between BGP speakers when route reflectors are deployed. This additional path is added to the best-path, and the best path algorithm still remains unchanged.
Q155. Which multicast protocol uses source trees and RPF?
A. DVMRP
B. PIM sparse mode
C. CBT
D. mOSPF
Answer: A
Explanation:
DVMRP builds a parent-child database using a constrained multicast model to build a forwarding tree rooted at the source of the multicast packets. Multicast packets are initially flooded down this source tree. If redundant paths are on the source tree, packets are not forwarded along those paths. Forwarding occurs until prune messages are received on those parent-child links, which further constrains the broadcast of multicast packets.
Reference: DVMRP and dense-mode PIM use only source trees and use RPF as previously described.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3550/software/release/12-1_19_ea1/configuration/guide/3550scg/swmcast.html
Q156. Which three features are common to OSPF and IS-IS? (Choose three.)
A. They both maintain a link-state database from which a Dijkstra-based SPF algorithm computes a shortest path tree.
B. They both use DR and BDR in the broadcast network.
C. They both use hello packets to form and maintain adjacencies.
D. They both use NSSA and stub type areas to scale the network design.
E. They both have areas to form a two-level hierarchical topology.
Answer: A,C,E
Q157. An IP SLA fails to generate statistics. How can you fix the problem?
A. Add the verify-data command to the router configuration.
B. Reload the router configuration.
C. Remove the ip sla schedule statement from the router configuration and re-enter it.
D. Add the debug ip sla error command to the router configuration.
E. Add the debug ip sla trace command to the router configuration.
Answer: A
Q158. Which neighbor-discovery message type is used to verify connectivity to a neighbor when the link-layer address of the neighbor is known?
A. neighbor solicitation
B. neighbor advertisement
C. router advertisement
D. router solicitation
Answer: A
Explanation:
IPv6 Neighbor Solicitation Message A value of 135 in the Type field of the ICMP packet header identifies a neighbor solicitation message. Neighbor solicitation messages are sent on the local link when a node wants to determine the link-layer address of another node on the same local link (see the figure below). When a node wants to determine the link-layer address of another node, the source address in a neighbor solicitation message is the IPv6 address of the node sending the neighbor solicitation message. The destination address in the neighbor solicitation message is the solicited-node multicast address that corresponds to the IPv6 address of the destination node. The neighbor solicitation message also includes the link-layer address of the source node.
Figure 1. IPv6 Neighbor Discovery: Neighbor Solicitation Message
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_basic/configuration/xe-3s/ip6b-xe-3s-book/ip6-neighb-disc-xe.html
Q159. When deploying redundant route reflectors in BGP, which attribute can you configure on the route reflector to allow routes to be identified as belonging to the same group?
A. ROUTER_ID
B. CLUSTER_ID
C. ORIGINATOR_ID
D. PEER_GROUP
Answer: B
Explanation:
Together, a route reflector and its clients form a cluster. When a single route reflector is deployed in a cluster, the cluster is identified by the router ID of the route reflector. The bgp cluster-id command is used to assign a cluster ID to a route reflector when the cluster has one or more route reflectors. Multiple route reflectors are deployed in a cluster to increase redundancy and avoid a single point of failure. When multiple route reflectors are configured in a cluster, the same cluster ID is assigned to all route reflectors. This allows all route reflectors in the cluster to recognize updates from peers in the same cluster and reduces the number of updates that need to be stored in BGP routing tables.
Reference: http://ieoc.com/forums/t/5326.aspx
Q160. DRAG DROP
Drag each IPv6 extension header on the left to its corresponding description on the right.
Answer: