Act now and download your Cisco 400 101 pdf test today! Do not waste time for the worthless Cisco cisco 400 101 tutorials. Download Refresh Cisco CCIE Routing and Switching (v5.0) exam with real questions and answers and begin to learn Cisco 400 101 dumps with a classic professional.

Q41. Refer to the exhibit. 

All of the routers on this network are running RIP. If you edit the R3 RIP process configuration to reduce the number of hops from R3 to R1, which statement about the configuration change is true? 

A. Configuring no passive-interface for GigabitEthernet0/0 in the R3 RIP process reduces the number of hops to R1 by 2. 

B. Configuring no passive-interface for GigabitEthernet0/0 in the R3 RIP process reduces the number of hops to R1 by 1. 

C. Configuring no passive-interface for GigabitEthernet0/1 in the R3 RIP process reduces the number of hops to R1 by 3. 

D. Configuring no passive-interface for GigabitEthernet0/1 in the R3 RIP process reduces the number of hops to R1 by 1. 

Answer:

Explanation: 

By changing the link from R3 to R2 to not be passive, traffic can then take the direct route from R3-R2-R1 instead of the longer path of R3-R6-R5-R4-R1, resulting in two less hops. 


Q42. Which three EIGRP packet types are valid? (Choose three.) 

A. open 

B. notification 

C. keep-alive 

D. hello 

E. query 

F. reply 

Answer: D,E,F 

Explanation: 

EIGRP uses the following packet types: hello and acknowledgment, update, and query and reply. 

Hello packets are multicast for neighbor discovery/recovery and do not require acknowledgment. An acknowledgment packet is a hello packet that has no data. Acknowledgment packets contain a nonzero acknowledgment number and always are sent by using a unicast address. 

Update packets are used to convey reachability of destinations. When a new neighbor is discovered, unicast update packets are sent so that the neighbor can build up its topology table. In other cases, such as a link-cost change, updates are multicast. Updates always are transmitted reliably. 

Query and reply packets are sent when a destination has no feasible successors. Query packets are always multicast. Reply packets are sent in response to query packets to instruct the originator not to recompute the route because feasible successors exist. Reply packets are unicast to the originator of the query. Both query and reply packets are transmitted reliably. 

Reference: http://docwiki.cisco.com/wiki/Enhanced_Interior_Gateway_Routing_Protocol 


Q43. How many bytes comprise the system ID within an IS-IS NET? 

A. 4 bytes 

B. 6 bytes 

C. 8 bytes 

D. 16 bytes 

E. 20 bytes 

Answer:

Explanation: 

Routers are identified with NETs of 8 to 20 bytes. ISO/IEC 10589 distinguishes only three fields in the NSAP address format: a variable-length area address beginning with a single octet, a system ID, and a 1-byte n-selector. Cisco implements a fixed length of 6 bytes for the system ID, which is like the OSPF router ID. 

Reference: http://www.cisco.com/en/US/products/ps6599/products_white_paper09186a00800a3e6f.sh tml 


Q44. Refer to the exhibit. 

Why is network 172.16.1.0/24 not installed in the routing table? 

A. There is no ARP entry for 192.168.1.1. 

B. The router cannot ping 192.168.1.1. 

C. The neighbor 192.168.1.1 just timed out and BGP will flush this prefix the next time that the BGP scanner runs. 

D. There is no route for 192.168.1.1 in the routing table. 

Answer:

Explanation: 

Here we see that the next hop IP address to reach the 172.16.1.0 network advertised by the BGP peer is 192.168.1.1. However, the 192.168.1.1 IP is not in the routing table of R3 so it adds the route to the BGP table but marks it as inaccessible, as shown. 


Q45. Which two statements about device access control are true? (Choose two.) 

A. The AUX port is displayed as type tty in the output of the show line command. 

B. VTY lines are associated with physical interfaces on a network device. 

C. MPP restricts device-management access to interfaces that are configured under the control plane host configuration. 

D. The enable password command sets an MD5 one-way encrypted password. 

E. The console port supports hardware flow control 

Answer: C,E 


Q46. Refer to the exhibit. 

Which option is the result of this configuration? 

A. All SNMP traffic coming into the router is redirected to interface GigabitEthernet1/0. 

B. All SNMP traffic generated from the router is redirected to interface GigabitEthernet1/0. 

C. All SMTP traffic generated from the router is redirected to interface GigabitEthernet1/0. 

D. All POP3 traffic coming into the router is redirected to interface GigabitEthernet1/0. 

E. All SMTP traffic coming into the router is redirected to interface GigabitEthernet1/0. 

Answer:

Explanation: 

This is an example of policy based routing, where traffic sourced from this router that matches the access list (all traffic with port 25 which is SMTP) will be forced out the Gig 0/1 interface. 


Q47. Which option is a correct match criterion for policy-based routing? 

A. length 

B. interface type 

C. interface 

D. cost 

Answer:


Q48. Refer to the exhibit. 

How many LSDBs will router A have? 

A. 0 

B. 1 

C. 2 

D. 3 

Answer:


Q49. Refer to the exhibit. 

While troubleshooting high CPU utilization of a Cisco Catalyst 4500 Series Switch, you notice the error message that is shown in the exhibit in the log file. 

What can be the cause of this issue, and how can it be prevented? 

A. The hardware routing table is full. Redistribute from BGP into IGP. 

B. The software routing table is full. Redistribute from BGP into IGP. 

C. The hardware routing table is full. Reduce the number of routes in the routing table. 

D. The software routing table is full. Reduce the number of routes in the routing table. 

Answer:

Explanation: 

L3HWFORWADING-2 

Error MessageC4K_L3HWFORWARDING-2-FWDCAMFULL:L3 routing table is full. 

Switching to software forwarding. 

The hardware routing table is full; forwarding takes place in the software instead. The switch performance might be degraded. 

Recommended Action: Reduce the size of the routing table. Enter the ip cef command to return to hardware forwarding. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/31sg/system/message/message/emsg.html 


Q50. Which two statements about RSTP and MSTP BPDUs are true? (Choose two.) 

A. MSTP switches can detect boundary ports when they receive RSTP version 2 BPDUs. 

B. MSTP switches can detect boundary ports when they receive RSTP version 1 BPDUs. 

C. RSTP switches can process MSTP version 3 BPDUs. 

D. When all boundary switches are running RSTP, MST sends only version 0 configuration BPDUs. 

Answer: A,C 

Explanation: 

A switch running both MSTP and RSTP supports a built-in protocol migration mechanism that enables it to interoperate with legacy 802.1D switches. If this switch receives a legacy 802.1D configuration BPDU (a BPDU with the protocol version set to 0), it sends only 802.1D BPDUs on that port. An MST switch can also detect that a port is at the boundary of a region when it receives a legacy BPDU, an MST BPDU (version 3) associated with a different region, or an RST BPDU (version 2). 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2950/software/release/12-1_9_ea1/configuration/guide/scg/swmstp.html