aiotestking uk

400-101 Exam Questions - Online Test


400-101 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Which command correctly configures standby tracking for group 1 using the default decrement priority value? 

A. standby 1 track 100 

B. standby 1 track 100 decrement 1 

C. standby 1 track 100 decrement 5 

D. standby 1 track 100 decrement 20 

Answer:

Q2. Which three statements about DMVPN are true? (Choose three.) 

A. It facilitates zero-touch configuration for addition of new spokes. 

B. It supports dynamically addressed spokes using DHCP. 

C. It features automatic IPsec triggering for building an IPsec tunnel. 

D. It requires uses of IPsec to build the DMVPN cloud. 

E. Spokes can build tunnels to other spokes and exchange traffic directly. 

F. It supports server load balancing on the spokes. 

Answer: A,C,E 

Q3. Refer to the exhibit. 

What happens to packets when traffic in the icmp-class class exceeds the policed amount? 

A. Packets are discarded and a message is logged. 

B. Packets are discarded and a trap is sent to any servers that are configured to receive traps. 

C. Packets are discarded silently. 

D. Packets are discarded and an inform is sent to any servers that are configured to receive informs. 

Answer:

Explanation: 

service-policy {input| output policy-map-name Example: 

Router(config-cp)# service-policy input control-plane-policy 

Attaches a QoS service policy to the control plane. Note the following points: 

. input --Applies the specified service policy to packets received on the control plane. 

. output --Applies the specified service policy to packets transmitted from the control plane and enables the router to silently discard packets. 

. policy-map-name --Name of a service policy map (created using the policy-mapcommand) to be attached. The name can be a maximum of 40 alphanumeric characters. 

In this case, the service policy is set to output, which drops the traffic silently per above. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/qos_plcshp/configuration/15-mt/qos-plcshp-15-mt-book/qos-plcshp-ctrl-pln-plc.html 

Q4. Refer to the exhibit. 

Why is the router out of memory? 

A. The router is experiencing a BGP memory leak software defect. 

B. The BGP peers have been up for too long. 

C. The amount of BGP update traffic in the network is too high. 

D. The router has insufficient memory due to the size of the BGP database. 

Answer:

Explanation: 

Here we can see that this router is running out of memory due to the large size of the BGP routing database. In this case, this router is receiving over 200,000 routes from each of the 4 peers. 

Q5. Which three statements are functions that are performed by IKE phase 1? (Choose three.) 

A. It builds a secure tunnel to negotiate IKE phase 1 parameters. 

B. It establishes IPsec security associations. 

C. It authenticates the identities of the IPsec peers. 

D. It protects the IKE exchange by negotiating a matching IKE SA policy. 

E. It protects the identities of IPsec peers. 

F. It negotiates IPsec SA parameters. 

Answer: C,D,E 

Explanation: 

The basic purpose of IKE phase 1 is to authenticate the IPSec peers and to set up a secure channel between the peers to enable IKE exchanges. IKE phase 1 performs the following functions: 

. Authenticates and protects the identities of the IPSec peers 

. Negotiates a matching IKE SA policy between peers to protect the IKE exchange 

. Performs an authenticated Diffie-Hellman exchange with the end result of having matching shared secret keys 

. Sets up a secure tunnel to negotiate IKE phase 2 parameters 

Reference: http://www.ciscopress.com/articles/article.asp?p=25474&seqNum=7

Q6. DRAG DROP 

Drag and drop the PPPoE packet type on the left to the corresponding description on the right. 

Answer:  

Q7. Refer to the exhibit. 

Which feature can R1 use to fail over from R2 to R3 if the address for R2 becomes unavailable? 

A. object tracking 

B. HSRP 

C. GLBP 

D. LACP 

Answer:

Explanation: 

The object tracking feature allows you to create a tracked object that multiple clients can use to modify the client behavior when a tracked object changes. Several clients register their interest with the tracking process, track the same object, and take different actions when the object state changes. 

Clients include the following features: 

. Embedded Event Manager (EEM) 

. Gateway Load Balancing Protocol (GLBP) 

. Hot Standby Redundancy Protocol (HSRP) 

. Virtual port channel (vPC) 

. Virtual Router Redundancy Protocol (VRRP) 

The object tracking monitors the status of the tracked objects and communicates any changes made to interested clients. Each tracked object is identified by a unique number that clients can use to configure the action to take when a tracked object changes state. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx-os/unicast/configuration/guide/l3_cli_nxos/l3_object.html 

Q8. Which statement about a type 4 LSA in OSPF is true? 

A. It is an LSA that is originated by an ABR, that is flooded throughout the AS, and that describes a route to the ASBR. 

B. It is an LSA that is originated by an ASBR, that is flooded throughout the AS, and that describes a route to the ASBR. 

C. It is an LSA that is originated by an ASBR, that is flooded throughout the area, and that describes a route to the ASBR. 

D. It is an LSA that is originated by an ABR, that is flooded throughout the AS, and that describes a route to the ABR. 

E. It is an LSA that is originated by an ABR, that is flooded throughout the area, and that describes a route to the ASBR. 

Answer:

Explanation: 

LSA Type 4 (called Summary ASBR LSA) is generated by the ABR to describe an ASBR to routers in other areas so that routers in other areas know how to get to external routes through that ASBR. 

Q9. Which technology facilitates neighbor IP address resolution in DMVPN? 

A. CEF 

B. mGRE 

C. a dynamic routing protocol 

D. NHRP 

Answer:

Explanation: 

NHRP Used with a DMVPN 

NHRP is used to facilitate building a VPN and provides address resolution in DMVPN. In this context, a VPN consists of a virtual Layer 3 network that is built on top of an actual Layer 3 network. The topology you use over the VPN is largely independent of the underlying network, and the protocols you run over it are completely independent of it. The VPN network (DMVPN) is based on GRE IP logical tunnels that can be protected by adding in IPsec to encrypt the GRE IP tunnels. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_4/ip_addr/configuration/guide/hadnhrp.html#w p1057255 

Q10. Refer to the exhibit. 

Which statement is true? 

A. This is an MPLS TE point-to-multipoint LSP in an MPLS network. 

B. This is an MPLS TE multipoint-to-point LSP in an MPLS network. 

C. This is a point-to-multipoint LSP in an MPLS network. 

D. This is a multipoint-to-multipoint LSP in an MPLS network. 

Answer:

Explanation: 

Same example of this provided on slide 24 at the reference link below: 

Reference: “mVPN Deployment Models” Cisco Live Presentation 

http://d2zmdbbm9feqrf.cloudfront.net/2014/eur/pdf/BRKIPM-2011.pdf, slide 24