Want to know Testking cisco 400 101 Exam practice test features? Want to lear more about Cisco CCIE Routing and Switching (v5.0) certification experience? Study Virtual Cisco 400 101 vce answers to Up to the immediate present 400 101 dumps questions at Testking. Gat a success with an absolute guarantee to pass Cisco ccie 400 101 dumps (CCIE Routing and Switching (v5.0)) test on your first attempt.

Q1. Which two statements about ERSPAN are true? (Choose two.) 

A. It supports jumbo frames of up to 9202 bytes. 

B. It adds a 50-byte header to copied Layer 2 Ethernet frames. 

C. It supports packet fragmentation and reassembles the packets. 

D. It adds a 4-byte header to copied Layer 2 Ethernet frames. 

E. Source sessions on an individual switch can use different origin IP addresses. 

Answer: A,B 


Q2. Which three characteristics are shared by subinterfaces and associated EVNs? (Choose three.) 

A. IP address 

B. routing table 

C. forwarding table 

D. access control lists 

E. NetFlow configuration 

Answer: A,B,C 


Q3. On an MPLS L3VPN, which two tasks are performed by the PE router? (Choose two.) 

A. It exchanges VPNv4 routes with other PE routers. 

B. It typically exchanges iBGP routing updates with the CE device. 

C. It distributes labels and forwards labeled packets. 

D. It exchanges VPNv4 routes with CE devices. 

E. It forwards labeled packets between CE devices. 

Answer: A,C 

Explanation: 

MPLS VPN functionality is enabled at the edge of an MPLS network. The PE router performs these tasks: . 

Exchanges routing updates with the CE router . 

Translates the CE routing information into VPN version 4 (VPNv4) routes . 

Exchanges VPNv4 routes with other PE routers through the Multiprotocol Border Gateway Protocol (MP-BGP) 

A PE router binds a label to each customer prefix learned from a CE router and includes the label in the network reachability information for the prefix that it advertises to other PE routers. When a PE router forwards a packet received from a CE router across the provider network, it labels the packet with the label learned from the destination PE router. When the destination PE router receives the labeled packet, it pops the label and uses it to direct the packet to the correct CE router. Label forwarding across the provider backbone is based on either dynamic label switching or traffic engineered paths. A customer data packet carries two levels of labels when traversing the backbone 

Reference: http://www.cisco.com/c/en/us/td/docs/routers/asr9000/software/asr9k_r4-2/lxvpn/configuration/guide/vcasr9kv342/vcasr9k42v3.html 


Q4. Which two statements are true about IS-IS? (Choose two.) 

A. IS-IS DIS election is nondeterministic. 

B. IS-IS SPF calculation is performed in three phases. 

C. IS-IS works over the data link layer, which does not provide for fragmentation and reassembly. 

D. IS-IS can never be routed beyond the immediate next hop. 

Answer: C,D 

Explanation: 

IS-IS runs directly over the data link alongside IP. On Ethernet, IS-IS packets are always 802.3 frames, with LSAPs 0xFEFE while IP packets are either Ethernet II frames or SNAP frames identified with the protocol number 0x800. OSPF runs over IP as protocol number 89. 

IS-IS runs directly over layer 2 and hence: 

-cannot support virtual links unless some explicit tunneling is implemented 

-packets are kept small so that they don't require hop-by-hop fragmentation 

-uses ATM/SNAP encapsulation on ATM but there are hacks to make it use VcMux encapsulation 

-some operating systems that support IP networking have been implemented to differentiate Layer 3 packets in kernel. Such Oss require a lot of kernel modifications to support IS-IS for IP routing. 

-can never be routed beyond the immediate next hop and hence shielded from IP spoofing and similar Denial of Service attacks. 

Reference: https://tools.ietf.org/html/draft-bhatia-manral-diff-isis-ospf-00 


Q5. Which statement describes what it means if a router has an OSPF priority set to 0? 

A. A router with the OSPF priority set to 0 is one that can participate in the election of a DR. It has the highest priority. 

B. A router with the OSPF priority set to 0 is one that cannot participate in the election of a DR, but it can become a BDR 

C. A router with the OSPF priority set to 0 is one that cannot participate in the election of a DR. It can become neither a DR nor a BDR. 

D. A router with the OSPF priority set to 0 is one that cannot participate in the election of a BDR, but it can become a DR 

Answer:


Q6. Which statement about the bgp soft-reconfig-backup command is true? 

A. It requires BGP to store all inbound and outbound updates. 

B. It overrides soft reconfiguration for devices that support inbound soft reconfiguration. 

C. When the peer is unable to store updates, the updates are implemented immediately. 

D. It provides soft reconfiguration capabilities for peers that are unable to support route refresh. 

E. It provides outbound soft reconfiguration for peers. 

Answer:


Q7. Which two BGP path attributes are visible in Wireshark? (Choose two.) 

A. weight 

B. AS path 

C. local preference 

D. route maps 

Answer: B,C 


Q8. You are configuring a DMVPN spoke to use IPsec over a physical interface that is located within a VRF. For which three configuration sections must you specify the VRF name? (Choose three.) 

A. the ISAKMP profile 

B. the crypto keyring 

C. the IPsec profile 

D. the IPsec transform set 

E. the tunnel interface 

F. the physical interface 

Answer: B,E,F 

Explanation: 

ip vrf forwardingvrf-name 

Example: 

Router(config-if)# ip vrf forwarding green 

Associates a virtual private network (VPN) routing and forwarding (VRF) instance with an interface or subinterface. 

. vrf-name is the name assigned to a VRF. 

Router(config-if)# tunnel vrfvrf-name 

Example: 

Router(config-if)# tunnel vrf finance1 

Associates a VPN routing and forwarding (VRF) instance with a specific tunnel destination. vrf-name is the name assigned to a VRF. 

Router(config)# crypto keyringkeyring-name [vrf fvrf-name] 

Defines a crypto keyring to be used during IKE authentication and enters keyring configuration mode. 

. keyring-name—Name of the crypto keyring. 

. fvrf-name—(Optional) Front door virtual routing and forwarding (FVRF) name to which the keyring will be referenced. fvrf-name must match the FVRF name that was defined during virtual routing and forwarding (VRF) configuration