♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 400-101 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/400-101-exam-dumps.html

2021 Apr 400-101 pdf exam

Q151. Refer to the exhibit. 

What is the PHB class on this flow? 

A. EF 

B. none 

C. AF21 

D. CS4 

Answer:

Explanation: 

This command shows the TOS value in hex, which is 80 in this case. The following chart shows some common DSCP/PHB Class values: 

Service 

DSCP value 

TOS value 

Juniper Alias 

TOS hexadecimal 

DSCP - TOS Binary 

Premium IP 

46 

184 

ef 

B8 

101110 - 101110xx 

LBE 

32 

cs1 

20 

001000 - 001000xx 

DWS 

32 

128 

cs4 

80 

100000 - 100000xx 

Network control 

48 

192 

cs6 

c0 

110000 - 110000xx 

Network control 2 

56 

224 

cs7 

e0 

111000 - 111000xx 

Reference: http://www.tucny.com/Home/dscp-tos 


Q152. Refer to the exhibit. 

Which two statements about this configuration are true? (Choose two.) 

A. Spoke devices will be dynamically added to the NHRP mappings. 

B. The next-hop server address must be configured to 172.168.1.1 on all spokes. 

C. The next-hop server address must be configured to 192.168.1.1 on all spokes. 

D. R1 will create a static mapping for each spoke. 

Answer: A,C 

Explanation: 

NHRP is a client/server model protocol which is defined by RFC2332. The hub is considered to be the Next Hop Server (NHS) and the spokes are considered to be the Next Hop Client (NHC). The hub must be configured as the next-hop server. NHRP provides a mapping between the inside and outside address of a tunnel endpoint. These mappings can be static or dynamic. In a dynamic scenario, a next-hop server (NHS) is used to maintain a list of possible tunnel endpoints. Each endpoint using the NHS registers its own public and private mapping with the NHS. The local mapping of the NHS must always be static. It is important to note that the branch points to the inside or protected address of the NHS server. This scenario is an example of dynamic mappings. 

Reference: http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/WAN_and_MAN/DMVPDG/DMV PN_2_Phase2.html 


Q153. Which two statements about the max-age time in IS-IS are true? (Choose two.) 

A. The IS-IS max-age time is 20 minutes by default. 

B. The IS-IS max-age time is 60 minutes by default. 

C. The IS-IS max-age time increments from zero to max-age. 

D. The IS-IS max-age time decrements from max-age to zero. 

Answer: A,D 


Q154. Which statement about BGP and diverse path advertisement is true? 

A. The BGP best-path selection must be disabled. 

B. The BGP best-path selection algorithm has been changed to always ignore the IGP metric. 

C. The BGP best-path selection algorithm has been changed so that two BGP paths can be flagged as best in the BGP table. 

D. The BGP best-path selection algorithm has not been changed. 

E. The BGP best-path selection is disabled for BGP routes for which the feature is enabled. 

Answer:

Explanation: 

The BGP Diverse Path Using a Diverse-Path Route Reflector feature allows BGP to distribute an alternative path other than the best path between BGP speakers when route reflectors are deployed. This additional path is added to the best-path, and the best path algorithm still remains unchanged. 


Q155. Which multicast protocol uses source trees and RPF? 

A. DVMRP 

B. PIM sparse mode 

C. CBT 

D. mOSPF 

Answer:

Explanation: 

DVMRP builds a parent-child database using a constrained multicast model to build a forwarding tree rooted at the source of the multicast packets. Multicast packets are initially flooded down this source tree. If redundant paths are on the source tree, packets are not forwarded along those paths. Forwarding occurs until prune messages are received on those parent-child links, which further constrains the broadcast of multicast packets. 

Reference: DVMRP and dense-mode PIM use only source trees and use RPF as previously described. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3550/software/release/12-1_19_ea1/configuration/guide/3550scg/swmcast.html 


Q156. Which three features are common to OSPF and IS-IS? (Choose three.) 

A. They both maintain a link-state database from which a Dijkstra-based SPF algorithm computes a shortest path tree. 

B. They both use DR and BDR in the broadcast network. 

C. They both use hello packets to form and maintain adjacencies. 

D. They both use NSSA and stub type areas to scale the network design. 

E. They both have areas to form a two-level hierarchical topology. 

Answer: A,C,E 


Q157. An IP SLA fails to generate statistics. How can you fix the problem? 

A. Add the verify-data command to the router configuration. 

B. Reload the router configuration. 

C. Remove the ip sla schedule statement from the router configuration and re-enter it. 

D. Add the debug ip sla error command to the router configuration. 

E. Add the debug ip sla trace command to the router configuration. 

Answer:


Q158. Which neighbor-discovery message type is used to verify connectivity to a neighbor when the link-layer address of the neighbor is known? 

A. neighbor solicitation 

B. neighbor advertisement 

C. router advertisement 

D. router solicitation 

Answer:

Explanation: 

IPv6 Neighbor Solicitation Message A value of 135 in the Type field of the ICMP packet header identifies a neighbor solicitation message. Neighbor solicitation messages are sent on the local link when a node wants to determine the link-layer address of another node on the same local link (see the figure below). When a node wants to determine the link-layer address of another node, the source address in a neighbor solicitation message is the IPv6 address of the node sending the neighbor solicitation message. The destination address in the neighbor solicitation message is the solicited-node multicast address that corresponds to the IPv6 address of the destination node. The neighbor solicitation message also includes the link-layer address of the source node. 

Figure 1. IPv6 Neighbor Discovery: Neighbor Solicitation Message 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_basic/configuration/xe-3s/ip6b-xe-3s-book/ip6-neighb-disc-xe.html 


Q159. When deploying redundant route reflectors in BGP, which attribute can you configure on the route reflector to allow routes to be identified as belonging to the same group? 

A. ROUTER_ID 

B. CLUSTER_ID 

C. ORIGINATOR_ID 

D. PEER_GROUP 

Answer:

Explanation: 

Together, a route reflector and its clients form a cluster. When a single route reflector is deployed in a cluster, the cluster is identified by the router ID of the route reflector. The bgp cluster-id command is used to assign a cluster ID to a route reflector when the cluster has one or more route reflectors. Multiple route reflectors are deployed in a cluster to increase redundancy and avoid a single point of failure. When multiple route reflectors are configured in a cluster, the same cluster ID is assigned to all route reflectors. This allows all route reflectors in the cluster to recognize updates from peers in the same cluster and reduces the number of updates that need to be stored in BGP routing tables. 

Reference: http://ieoc.com/forums/t/5326.aspx 


Q160. DRAG DROP 

Drag each IPv6 extension header on the left to its corresponding description on the right. 

Answer: