Actualtests provides 100% free of charge Cisco 400-101 braindumps which guarantee your success at the 1st attempt. No far more other web sites can provide this offer. You will have immediate access to our downloadable 400-101 examination engine software. Get the perfect Cisco Cisco training materials as well as make complete preparation for the 400-101 exam. You can find everything accessible that may look in the Cisco 400-101 exam. Each of our Cisco Cisco exam questions and answers are in specifics and in depth. We develop an interactive platform regarding all the candidates. You are able to visit the webpage, as well as talk with each other. So you may make progress quicker as well as easier.

2021 Mar 400-101 exam cram

Q111. Which two solutions can reduce UDP latency? (Choose two.) 

A. fast retransmission 

B. fast recovery 

C. fast start 

D. low-latency queuing 

E. IP service level agreements 

F. congestion-avoidance algorithm 

Answer: D,E 

Explanation: 

IP SLA uses active traffic monitoring, which generates traffic in a continuous, reliable, and predictable manner to measure network performance. IP SLA sends data across the network to measure performance between multiple network locations or across multiple network paths. It simulates network data and IP services, and collects network performance information in real time. This information is collected: 

Response times 

One-way latency, jitter (interpacket delay variance) 

Packet loss 

Network resource availability 

LLQ uses the priority command. The priority command allows you to set up classes based on a variety of criteria (not just User Datagram Ports (UDP) ports) and assign priority to them, and is available for use on serial interfaces and ATM permanent virtual circuits (PVCs). A similar command, the ip rtp priority command, allows you to stipulate priority flows based only on UDP port numbers. Note: All the other answer choices can be used to improve TCP performance, but not UDP. 

References: http://www.cisco.com/c/en/us/td/docs/routers/xr12000/software/xr12k_r4-2/system_monitoring/configuration/guide/b_sysmon_cg42xr12k/b_sysmon_cg42xr12k_chapter_011.html http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/fsllq26.html 


Q112. Refer to the exhibit. 

Which configuration reduces CPU utilization on R2 while still advertising the connected routes of R2 to R1? 

A. Configure eigrp stub connected on R2. 

B. Configure eigrp stub receive-only on R1. 

C. Configure eigrp stub static on R2. 

D. Configure eigrp stub summary on R1. 

Answer:


Q113. You are configuring a DHCPv6 client for a DHCPv6 server with the prefix delegation feature. Which option is a result of the interface configuration when you enter the command ipv6 address autoconfig default? 

A. a static IPv6 default route pointing to the upstream DHCP server 

B. a static IPv6 default route pointing to the upstream DHCP relay 

C. a static IPv6 default route pointing to the upstream router 

D. a temporary stateless address, formed from the EUI-64 bit address and the prefix from the route advertisement of the upstream router 

Answer:


Q114. Which two statements about the max-age time in IS-IS are true? (Choose two.) 

A. The IS-IS max-age time is 20 minutes by default. 

B. The IS-IS max-age time is 60 minutes by default. 

C. The IS-IS max-age time increments from zero to max-age. 

D. The IS-IS max-age time decrements from max-age to zero. 

Answer: A,D 


Q115. Which statement describes the function of rekey messages? 

A. They prevent unencrypted traffic from passing through a group member before registration. 

B. They refresh IPsec SAs when the key is about to expire. 

C. They trigger a rekey from the server when configuring the rekey ACL. 

D. They authenticate traffic passing through a particular group member. 

Answer:

Explanation: 

Rekey messages are used to refresh IPsec SAs. When the IPsec SAs or the rekey SAs are about to expire, one single rekey message for a particular group is generated on the key server. No new IKE sessions are created for the rekey message distribution. The rekey messages are distributed by the key server over an existing IKE SA. Rekeying can use multicast or unicast messages. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_getvpn/configuration/xe-3s/sec-get-vpn-xe-3s-book/sec-get-vpn.html 


Up to the immediate present 400-101 dumps:

Q116. Which option is an incorrect design consideration when deploying OSPF areas? 

A. area 1 - area 0 - MPLS VPN backbone - area 0 - area 2 

B. area 1 - MPLS VPN backbone - area 2 

C. area 1 - MPLS VPN backbone - area 1 

D. area 2 - area 0 - MPLS VPN backbone - area 1 

E. area 0 - area 2 - MPLS VPN superbackbone - area 1 

Answer:

Explanation: 

In the case of MPLS-VPN Backbone as The OSPF superbackbone behaves exactly like Area 0 in regular OSPF, so we cannot have two different area 0’s that are not directly connected to each other. When area 0 connects to the superbackbone, it simply becomes an extension of area 0. 


Q117. Which two discovery mechanism does LDP support? (Choose two.) 

A. strict 

B. extended 

C. loose 

D. targeted 

E. basic 

Answer: B,E 


Q118. What is the maximum number of classes that MQC can support in a single policy map? 

A. 512 

B. 256 

C. 128 

D. 64 

Answer:


Q119. Which two options are the two underlying protocols on which a DMVPN relies? (Choose two.) 

A. IPsec 

B. NHRP 

C. GDOI 

D. ISAKMP 

E. SSL 

F. NLRI 

Answer: A,B 


Q120. Refer to the exhibit. 

Which two commands are required on R3 in order for MPLS to function? (Choose two.) 

A. mpls ip 

B. ip cef 

C. mpls label protocol tdp 

D. mpls ip propagate-ttl 

Answer: A,B