[NEW UPDATED][Braindump2go] Cisco 400-101 VCE Dumps Free

CISCO NEWS: 400-101 Exam Questions has been Updated Today! Get Latest 400-101 VCE and 400-101 PDF Instantly! Welcome to Download the Newest Braindump2go 400-101 VCE&400-101 PDF Dumps: http://www.braindump2go.com/400-101.html (889 Q&As)

400-101 Dumps,400-101 PDF,400-101 VCE,400-101 Actual Test PDF,400-101 Book,400-101 Exam Questions,400-101 Braindumps,400-101 eBook,400-101 Study Guide,400-101 Practice Exam,400-101 Practice Test,400-101 Practice Questions

QUESTION 865
Which IPv6 tunneling mechanism requires a service provider to use one of its own native IPv6 blocks to guarantee that its IPv6 hosts will be reachable?

A.    6rd tunneling
B.    automatic 6to4 tunneling
C.    NAT-PT tunneling
D.    ISATAP tunneling
E.    manual ipv6ip tunneling
F.    automatic 4to6 tunneling

Answer: A

QUESTION 867
Which two discovery mechanism does LDP support? (Choose two.)

A.    strict
B.    extended
C.    loose
D.    targeted
E.    basic

Answer: BE

QUESTION 868
On a network using RIPng, the prefix field of a routing table entry has a value of 0:0:0:0:0:0:0:0. What does this value signify?

A.    The next hop address is unknown.
B.    The next hop address is a site-local address.
C.    The neighboring router has IPv6 ND disabled.
D.    The next hop address must be the originator of the route advertisement.
E.    The associated route follows a default route out of the network.

Answer: E

QUESTION 869
Which AS_PATH attribute can you use to prevent loops when implementing BGP confederations?

A.    AS_CONFED_SET
B.    AS_SEQUENCE
C.    AS_CONFED_SEQUENCE
D.    AS_SET

Answer: C

QUESTION 870
Which two statements about OSPF are true? (Choose two.)

A.    External type 2 routes are preferred over interarea routes.
B.    Intra-area routes are preferred over interarea routes.
C.    External type 1 routes are preferred over external type 2 routes.
D.    External type 1 routes are preferred over intra-area routes.
E.    External type 2 routes are preferred over external type 1 routes.

Answer: BC

QUESTION 871
Which two statements about the OSPF two-way neighbor state are true? (Choose two.)

A.    Each neighbor receives its own router ID in a hello packet from the other neighbor.
B.    Each neighbor receives a hello message from the other neighbor.
C.    It is valid only on NBMA networks.
D.    It is valid only on point-to-point networks.
E.    Each neighbor receives an acknowledgement of its own hello packet from the other neighbor.
F.    Each neighbor receives the router ID of the other neighbor in a hello packet from the other neighbor.

Answer: AE

QUESTION 874
Which two statements about device access control are true? (Choose two.)

A.    The AUX port is displayed as type tty in the output of the show line command.
B.    VTY lines are associated with physical interfaces on a network device.
C.    MPP restricts device-management access to interfaces that are configured under the control plane host configuration.
D.    The enable password command sets an MD5 one-way encrypted password.
E.    The console port supports hardware flow control

Answer: CE

QUESTION 875
In the DiffServ model, which class represents the highest priority with the lowest drop probability? (*)

A.    AF13
B.    AF43
C.    AF11
D.    AF41

Answer: D

QUESTION 879
Which two methods can you use to limit the range for EIGRP queries? (Choose two.)

A.    Use an access list to deny the multicast address 224.0.0.1 outbound from select EIGRP neighbor and permit everything else.
B.    Configure route tagging for all EIGRP routes.
C.    Summarize routes at the boundary routers of the EIGRP domain.
D.    Configure unicast EIGRP on all routers in the EIGRP domain.
E.    Configure stub routers in the EIGRP domain.
F.    Use an access list to deny the multicast address 224.0.0.10 outbound from select EIGRP neighbors and permit everything else.

Answer: CE

QUESTION 880
Which two best practices does Cisco recommend to migrate a network from PVST+ to MST? (Choose two.)

A.    Start the migration at the edge nodes and work toward the root bridge.
B.    Before starting the transition, configure one of the edge nodes with a lower priority so that it becomes the root bridge after the transition.
C.    Before starting the transition, ensure that at least two nodes act as the root bridge for all VLANs in the network.
D.    Start the migration at the root bridge and work toward the edge nodes.
E.    Before starting the transition, configure one of the edge nodes with a higher priority so that it becomes the root bridge after the transition.
F.    Before starting the transition, ensure that one node is the root bridge for all VLANs in the network.

Answer: AF

QUESTION 883
Refer to the exhibit. Which two statements about this egress queue are true? (Choose two.)

A.    The queue 3 buffer is allocated 20 percent, its drop threshold is 100 percent, and it is guaranteed 400 percent of memory.
B.    The queue 1 buffer is allocated 30 percent, its drop threshold is 25 percent, and it is guaranteed 100 percent of memory.
C.    The queue 1 buffer is allocated 30 percent, its drop threshold is 100 percent, and it is guaranteed 150 percent of memory.
D.    The queue 2 buffer is allocated 30 percent, its drop threshold is 200 percent, and it can use at maximum 400 percent of memory.
E.    The queue 3 buffer is allocated 30 percent, its drop threshold is 100 percent, and it can use at maximum 400 percent of memory.

Answer: BD

QUESTION 884
Which two statements about the function of PIM designated router are true? (Choose two.)

A.    It registers directly connected source to the PIM rendezvous point.
B.    It sends PIM asserts on the interface of the outgoing interface list.
C.    It sends PIM Join/Prune messages for directly connected receivers.
D.    It forwards multicast traffic from the source into the PIM network.
E.    It sends IGMP queries.

Answer: AC

QUESTION 885
Refer to exhibit. The router is unreachable using telnet. Which option is solution?


A.    Use an extended access list instead of standard access list.
B.    The transport output telnet command must be added.
C.    The VRF configuration must be completed.
D.    The “vrf-also” keyword must be added to the access-class configuration.

Answer: D


FREE DOWNLOAD: NEW UPDATED 400-101 PDF Dumps & 400-101 VCE Dumps from Braindump2go: http://www.braindump2go.com/400-101.html (889 Q&As)

Comments are closed.