It is impossible to pass Cisco cisco 400 101 exam without any help in the short term. Come to Pass4sure soon and find the most advanced, correct and guaranteed Cisco 400 101 dumps practice questions. You will get a surprising result by our Leading CCIE Routing and Switching (v5.0) practice guides.

Q171. Refer to the exhibit. 

Which statement is true? 

A. R2 is directly connected to the receiver for this group and is the winner of an assert mechanism. 

B. R2 is directly connected to the receiver for this group, and it forwards the traffic onto Ethernet3/0, but it is forwarding duplicate traffic onto Ethernet3/0. 

C. R2 has the A flag (Accept flag) set on Ethernet 3/0. This is fine, since the group is in BIDIR-PIM mode. 

D. R2 is directly connected to the receiver for this group and is the loser of an assert mechanism. 

E. The A flag is set until the SPT threshold is reached for this multicast group. 

Answer:

Explanation: 

show ip mroute Field Descriptions 

Field 

Description 

RPF neighbor or RPF nbr 

IP address of the upstream router to the source. Tunneling indicates that this router is sending data to the RP encapsulated in register packets. The hexadecimal number in parentheses indicates to which RP it is registering. Each bit indicates a different RP if multiple RPs per group are used. If an asterisk (*) appears after the IP address in this field, the RPF neighbor has been learned through an assert. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/ipmulti/command/reference/fiprmc_r/1rfmult 3.html 


Q172. Refer to the exhibit. 

What is wrong with the configuration of this tunnel interface? 

A. ISATAP tunnels cannot use the EUI-64 address format. 

B. No tunnel destination has been specified. 

C. The tunnel source of an ISATAP tunnel must always point to a loopback interface. 

D. Router advertisements are disabled on this tunnel interface. 

Answer:

Explanation: 

Sending of IPv6 router advertisements is disabled by default on tunnel interfaces. This command reenables the sending of IPv6 router advertisements to allow client autoconfiguration: 

Example: Router(config-if)# no ipv6 nd ra suppress 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/interface/configuration/xe-3s/ir-xe-3s-book/ip6-isatap-xe.html 


Q173. DRAG DROP 

Drag and drop each IPv6 neighbor discovery message type on the left to the corresponding description on the right. 

Answer: 


Q174. Refer to the exhibit. 

You discover that only 1.5 Mb/s of web traffic can pass during times of congestion on the given network. 

Which two options are possible reasons for this limitation? (Choose two.) 

A. The web traffic class has too little bandwidth reservation. 

B. Video traffic is using too much bandwidth. 

C. The service-policy is on the wrong interface. 

D. The service-policy is going in the wrong direction. 

E. The NAT policy is adding too much overhead. 

Answer: A,B 

Explanation: 

In this example, the web traffic will fall into the default class, which is only 15 percent of the 10Mbps Internet connection (1.5Mbps). Meanwhile, video traffic is allowed 50% of the 10 Mbps. 


Q175. DRAG DROP 

Drag and drop the IS-IS component on the left to the function that it performs on the right. 

Answer: 


Q176. Refer to the exhibit. 

Why is the router out of memory? 

A. The router is experiencing a BGP memory leak software defect. 

B. The BGP peers have been up for too long. 

C. The amount of BGP update traffic in the network is too high. 

D. The router has insufficient memory due to the size of the BGP database. 

Answer:

Explanation: 

Here we can see that this router is running out of memory due to the large size of the BGP routing database. In this case, this router is receiving over 200,000 routes from each of the 4 peers. 


Q177. What is the new designation for the MPLS EXP (experimental) bits? 

A. QoS bits 

B. traffic class bits 

C. flow bits 

D. precedence bits 

Answer:

Explanation: 

To avoid misunderstanding about how this field may be used, it has become increasingly necessary to rename this field. This document changes the name of the EXP field to the "Traffic Class field" ("TC field"). In doing so, it also updates documents that define the current use of the EXP field. 

Reference: https://tools.ietf.org/html/rfc5462 


Q178. Under which condition does UDP dominance occur? 

A. when TCP traffic is in the same class as UDP 

B. when UDP flows are assigned a lower priority queue 

C. when WRED is enabled 

D. when ACLs are in place to block TCP traffic 

Answer:


Q179. Which switching technology can be used to solve reliability problems in a switched network? 

A. fragment-free mode 

B. cut-through mode 

C. check mode 

D. store-and-forward mode 

Answer:

Explanation: 

Characteristics of Store-and-Forward Ethernet Switching 

This section provides an overview of the functions and features of store-and-forward Ethernet switches. 

Error Checking 

Figure 1 shows a store-and-forward switch receiving an Ethernet frame in its entirety. At the end of that frame, the switch will compare the last field of the datagram against its own frame-check-sequence (FCS) calculations, to help ensure that the packet is free of physical and data-link errors. The switch then performs the forwarding process. Whereas a store-and-forward switch solves reliability issues by dropping invalid packets, cut-through devices forward them because they do not get a chance to evaluate the FCS before transmitting the packet. 

Figure 1. Ethernet Frame Entering a Store-and-Forward Bridge or Switch (from Left to Right) 

Reference: http://www.cisco.com/c/en/us/products/collateral/switches/nexus-5020-switch/white_paper_c11-465436.html 


Q180. Which statement is true when using a VLAN ID from the extended VLAN range (1006–4094)? 

A. VLANs in the extended VLAN range can be used with VTPv2 in either client or server mode. 

B. VLANs in the extended VLAN range can only be used as private VLANs. 

C. STP is disabled by default on extended-range VLANs. 

D. VLANs in the extended VLAN range cannot be pruned. 

Answer:

Explanation: 

Enabling VTP pruning on a VTP server enables pruning for the entire management domain. Making VLANs pruning-eligible or pruning-ineligible affects pruning eligibility for those VLANs on that device only (not on all switches in the VTP domain). VTP pruning takes effect several seconds after you enable it. VTP pruning does not prune traffic from VLANs that are pruning-ineligible. VLAN 1 and VLANs 1002 to 1005 are always pruning-ineligible; traffic from these VLANs cannot be pruned. Extended-range VLANs (VLAN IDs higher than 1005) are also pruning-ineligible. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3550/software/release/12-1_13_ea1/configuration/guide/3550scg/swvtp.html#wpxref48156