Master the ccie 400 101 dumps CCIE Routing and Switching (v5.0) content and be ready for exam day success quickly with this Actualtests 400 101 dumps free question. We guarantee it!We make it a reality and give you real 400 101 vce questions in our Cisco 400 101 pdf braindumps.Latest 100% VALID Cisco ccie 400 101 Exam Questions Dumps at below page. You can use our Cisco 400 101 ccie braindumps and pass your exam.

Q221. Refer to the exhibit. 

The two standalone chassis are unable to convert into a VSS. What can you do to correct the problem? 

A. Set a different port channel number on each chassis. 

B. Set a different virtual domain ID on each chassis. 

C. Set the redundancy mode to rpr on both chassis. 

D. Add two ports to the port channel group. 

Answer:


Q222. Which statement is true about MLD? 

A. MLD v1 gives hosts the ability to receive multicast packets from specific source addresses. 

B. All MLD messages are sent with a link-local IPv6 source address of FF02::D. 

C. The multicast address field is cleared to zero when sending an MLD report message. 

D. MLD is used by IPv6 routers to discover multicast listeners on a directly attached link. 

Answer:

Explanation: 

IPv6 Multicast Listener Discovery (MLD) is used by IPv6 devices to discover multicast listeners (nodes that want to receive multicast packets destined for specific multicast addresses) on directly attached links. There are two versions of MLD. MLD version 1 is based on version 2 of the IGMP for IPv4, and MLD version 2 is based on version 3 of the IGMP for IPv4. IPv6 multicast for Cisco software uses both MLD version 2 and MLD version 1. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipmulti_lsm/configuration/xe-3s/imc-lsm-xe-3s-book/ipv6-mcast-mld-xe.html 


Q223. Which two functions are performed by the DR in OSPF? (Choose two.) 

A. The DR originates the network LSA on behalf of the network. 

B. The DR is responsible for the flooding throughout one OSPF area. 

C. The DR forms adjacencies with all other OSPF routers on the network, in order to synchronize the LSDB across the adjacencies. 

D. The DR is responsible for originating the type 4 LSAs into one area. 

Answer: A,C 

Explanation: 

The DR originates the network LSA (LSA Type 2) which lists all the routers on the segment it is adjacent to -> A is correct. Types 2 are ooded within its area only; does not cross ABR -> B is incorrect. The broadcast and non-broadcast network types elect a DR/BDR. They form adjacencies to all other OSPF routers on the network and help synchronize the Link State Database (LSDB) across the adjacencies -> C is correct. LSAs Type 4 are originated by the ABR to describe an ASBR to routers in other areas so that routers in other areas know how to get to external routes through that ASBR -> D is incorrect. 


Q224. DRAG DROP 

Drag and drop the RIP configuration command on the left to the function it performs on the right. 

Answer: 


Q225. Refer to the exhibit. 

All switches have default bridge priorities, and originate BPDUs with MAC addresses as indicated. The numbers shown are STP link metrics. Which two ports are forwarding traffic after STP converges? (Choose two.) 

A. The port connecting switch SWD with switch SWE 

B. The port connecting switch SWG with switch SWF 

C. The port connecting switch SWC with switch SWE 

D. The port connecting switch SWB with switch SWC 

Answer: C,D 

Explanation: 

Here, we know SWB to SWC are forwarding because we already identified the blocking port. So for the last correct answer let’s consider what must be done to prevent a switch loop between SWC/SWD/SWE. SWE to SWD will be blocked because SWC has a lower MAC address so it wins the forwarding port. And to look at it further, you could try to further understand what would happen with ports on SWG. Would the ports on SWG try to go through SWE or SWF? SWE has the lower MAC address so the port from SWG to SWE would win the forwarding election. Therefore, answer B could never be correct. 


Q226. Which statement about the overload bit in IS-IS is true? 

A. The IS-IS adjacencies on the links for which the overload bit is set are brought down. 

B. Routers running SPF ignore LSPs with the overload bit set and hence avoid blackholing traffic. 

C. A router setting the overload bit becomes unreachable to all other routers in the IS-IS area. 

D. The overload bit in IS-IS is used only for external prefixes. 

Answer:

Explanation: 

The OL bit is used to prevent unintentional blackholing of packets in BGP transit networks. Due to the nature of these protocols, IS-IS and OSPF converge must faster than BGP. Thus there is a possibility that while the IGP has converged, IBGP is still learning the routes. In that case if other IBGP routers start sending traffic towards this IBGP router that has not yet completely converged it will start dropping traffic. This is because it isnt yet aware of the complete BGP routes. OL bit comes handy in such situations. When a new IBGP neighbor is added or a router restarts, the IS-IS OL bit is set. Since directly connected (including loopbacks) addresses on an “overloaded” router are considered by other routers, IBGP can be bought up and can begin exchanging routes. Other routers will not use this router for transit traffic and will route the packets out through an alternate path. Once BGP has converged, the OL bit is cleared and this router can begin forwarding transit traffic. 

Reference: https://routingfreak.wordpress.com/category/ospf-vs-is-is/ 


Q227. Refer to the exhibit. 

If the traffic flowing from network 192.168.254.0 to 172.16.250.0 is unencrypted, which two actions must you take to enable encryption? (Choose two). 

A. Configure the transform-set on R2 to match the configuration on R1. 

B. Configure the crypto map on R2 to include the correct subnet. 

C. Configure the ISAKMP policy names to match on R1 and R2. 

D. Configure the crypto map names to match on R1 and R2. 

E. Configure the Diffie-Hellman keys used in the ISAKMP policies to be different on R1 and R2. 

Answer: A,B 

Explanation: 

A transform set combines an encryption method and an authentication method. During the IPsec security association negotiation with ISAKMP, the peers agree to use a particular transform set to protect a particular data flow. The transform set must be the same for both peers. Also, the crypto map on R2 points to the address name of VPN, which includes 172.16.0.0/16, but it should be the local subnet of 192.168.0.0/16 


Q228. DRAG DROP 

Drag and drop the EIGRP query condition on the left to the corresponding action taken by the router on the right. 

Answer: 


Q229. Which statement about how a CE router is used in an MPLS VPN is true? 

A. It is located on the customer premises, where it peers and exchanges routes with the provider edge router. 

B. It is located on the provider premises, where it peers and exchanges routes with the customer edge router. 

C. It is located on the customer premises, but it is fully controlled by the provider, which provides a full routing table to the customer. 

D. It is located on the provider premises, and it routes only MPLS label traffic. 

Answer:


Q230. Which statement about shaped round robin queuing is true? 

A. Queues with higher configured weights are serviced first. 

B. The device waits a period of time, set by the configured weight, before servicing the next queue. 

C. The device services a single queue completely before moving on to the next queue. 

D. Shaped mode is available on both the ingress and egress queues. 

Answer:

Explanation: 

SRR is scheduling service for specifying the rate at which packets are dequeued. With SRR there are two modes, shaped and shared. Shaped mode is only available on the egress queues SRR differs from typical WRR. With WRR queues are serviced based on the weight. Q1 is serviced for weight 1 period of time, Q2 is served for weight 2 period of time, and so forth. 

The servicing mechanism works by moving from queue to queue and services them for the weighted amount of time. With SRR weights are still followed; however, SRR services Q1, moves to Q2, then Q3 and Q4 in a different way. It does not wait at and service each queue for a weighted amount of time before moving on to the next queue. Instead, SRR makes several rapid passes at the queues; in each pass, each queue might or might not be serviced. For each given pass, the more highly weighted queues are more likely to be serviced than the lower priority queues. 

Reference: http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-3560-e-series-switches/prod_qas0900aecd805bacc7.html