Hence, for those who have pondered adding the Cisco 400-201 credential immediately after name, do not forget that it does have got a understood and really legitimate importance. Maybe you are interested in having an individuals Cisco 400-201 qualifications ( CCIE SP Written v4.0 ) youre going to be upon right on track when it comes to taking your employment to a different and better stage.

2021 Dec 201-400 pozis:

Q11. In a Layer 2 VPN service, which is the default behavior of an EVC-based platform with regards to VLAN manipulation? 

A. keeps the VLAN tag of the incoming frame 

B. attaches two VLAN tags to the incoming frame 

C. removes the VLAN tag from the incoming frame 

D. removes all the VLAN tags from the incoming frame 

E. sets the VLAN tag of the incoming frame 

Answer:

Explanation: http://www.cisco.com/c/en/us/support/docs/routers/asr-9000-series-aggregation-services-routers/116453-technote-ios-xr-l2vpn-00.html#anc7 


Q12. Refer to the exhibit. 

The vrf MAINT has been provisioned and used by the Service Provider management network. The engineer discovers that syslog messages are not being received on the syslog server. IP reachability has been validated using ping. Which issue in the configuration must be corrected? 

A. logging on must include the vrf MAINT keyword. 

B. logging host must include the vrf MAINT keyword. 

C. The logging facility must be configured for syslog processing. 

D. The route targets that are configured do not match the route distinguisher. 

Answer:

Explanation: 

http://www.cisco.com/c/en/us/td/docs/ios/12_2sr/12_2sra/feature/guide/srvrfslg.html#wp10 59076 


Q13. DRAG DROP 

Drag and drop the subslot of the SIP-800 card that is used on Cisco CRS routers on the left to the correct PUM ASIC process on the right. 

Answer: 


Q14. Which are the three header fields that affect how Equal-Cost Multipath hashes traffic flow into interface groups? (Choose three.) 

A. source MAC address 

B. source port 

C. source IP address 

D. destination IP address 

E. IP protocol ID 

F. destination MAC address 

Answer: B,C,D 

Explanation: https://supportforums.cisco.com/document/111291/asr9000xr-loadbalancing-architecture-and-characteristics#field 


Q15. Refer to the exhibit. An MPLS Layer 3 VPN service has been provisioned for a customer. What will be the ToS value at Site-B for the exceeded traffic that it is sent from Site-A with ToS 2? 

A. 0 

B. 2 

C. 3 

D. 4 

E. No exceeded traffic will reach Site-B. 

Answer:


Improve peter electronic br 400-201:

Q16. In a routing virtualization concept, which are the two main techniques for creating virtualized router entities as defined by their physical and operational characteristics? (Choose two.) 

A. VDC 

B. SVR 

C. DRP 

D. HVR 

E. SDR 

Answer: B,D 

Explanation: 

http://www.cisco.com/en/US/solutions/collateral/ns341/ns524/ns562/ns573/white_paper_c1 1-512753_ns573_Networking_Solutions_White_Paper.html 


Q17. Users are complaining of intermittent high packet loss for seconds at a time. The engineer troubleshooting the issue finds that a TenGigE link is bouncing for milliseconds at a time, causing the traffic path to reconverge onto a congested FastEthernet link. What can the engineer do to prevent this service-affecting reconvergence only in the case of momentary link bounces until the link can be repaired? 

A. decrease the carrier-delay up on both sides of the link 

B. disable keepalives and BFD 

C. decrease the carrier-delay down on both sides of the link 

D. increase the carrier-delay up on both sides of the link 

E. increase the carrier-delay down on both sides of the link 

Answer:


Q18. Refer to the exhibit. The Service Provider is deploying Internet service to its VRF customers by using vrf INTERNET. A dedicated firewall provides NAT functionally towards the Internet. Assume that IP address overlapping between VRFs is not an issue. 

Which three configuration steps are required to add Internet service to the VRF customers? (Choose three.) 

A. Export the RD of vrf INTERNET from all customer VRFs. 

B. Originate a default route on PE4 in vrf INTERNET. 

C. Import the RD from vrf INTERNET in all customer VRFs. 

D. Originate a default route on the firewall in vrf INTERNET. 

E. Import the VRF “INTERNET” Route Target in all customer VRFs. 

F. Import the Route Target of all customer VRFs in vrf INTERNET. 

G. Leak all VRF routes to the global routing table. 

Answer: B,C,G 


Q19. MPLS Service Providers use Route Distinguishers and Route Targets as methods to control routing for customer VRFs. Which two statements are true about Route Distinguishers and Route Targets? (Choose two.) 

A. Route Targets are values that are used by a PE router to uniquely identify a VRF within its local MP-BGP VPNv4 table. 

B. Route Distinguishers are used by PE routers by exporting and importing routes into a local VRF. 

C. Route Targets are used by PE routers to define how to import and export prefixes into a local VRF database. 

D. Route Targets are extended communities that are used by MP-BGP to identify routes as they are advertised to neighbor PE routers. 

E. Route Distinguishers are values that are used by a PE router to uniquely identify a VRF within its local MP-BGP VPNv4 table. 

Answer: C,E 


Q20. Which BGP feature improves the convergence and response time to adjacency changes with BGP neighbors? 

A. reducing BGP scanner timing to the minimum that is supported 

B. BGP Multihop 

C. Next-Hop Address Tracking 

D. Fast Peering Session Deactivation 

E. TTL Security Check 

Answer:

Explanation: http://www.cisco.com/c/en/us/td/docs/ios/12_2sb/feature/guide/sbbnhop.html