400-101 Premium Bundle

400-101 Premium Bundle

CCIE Routing and Switching (v5.0) Certification Exam

4.5 
(37890 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Cisco 400-101 Free Practice Questions

Q1. Which flag in a configuration BPDU instructs all switches to shorten their bridge table aging process from the default 300 seconds to the current forward delay value? 

A. topology change bit 

B. topology change acknowledgment bit 

C. priority bit 

D. max-age bit 

Answer:

Explanation: 

The Root Bridge continues to set the Topology Change flag (TCN bit) in all Configuration BPDUs that it sends out for a total of Forward Delay + Max Age seconds (default = 35 (20+15) seconds). This flag instructs all bridges to shorten their MAC address table (Bridge table) aging process from the default value of 300 seconds to the current Forward Delay value of the bridge (default=15 seconds). The TCA flag is set by the upstream bridge to tell the downstream bridges to stop sending TCN BPDUs. The TC flag is set in configuration BPDU by the Root Bridge to shorten the bridge table age-out period from default 300 seconds to Forward Delay seconds. 

Q2. Which three statements about OSPFv3 address families are true? (Choose three.) 

A. Each address family requires the same instance ID. 

B. Address families can perform route redistribution into any IPv4 routing protocol. 

C. An address family can have two device processes on each interface. 

D. IPv4 address family require an IPv4 address to be configured on the interface. 

E. Each address family uses a different shortest path tree. 

F. Different address families can share the same link state database. 

Answer: B,D,E 

Q3. Which three statements about GLBP are true? (Choose three.) 

A. It uses a virtual MAC address that starts with 0007.b4. 

B. It elects a single active virtual gateway to appoint and manage multiple active virtual forwarders. 

C. It allows the configured virtual IP address to be used on a physical interface as well. 

D. It uses a virtual MAC address that starts with 0070.4b. 

E. It elects multiple active virtual gateways to appoint and manage a single active virtual forwarder. 

F. Preemption is enabled for the configured active virtual gateway by default. 

Answer: A,B,C 

Explanation: 

The virtual MAC address in GLBP is 0007.b400.xxyy where xx is the GLBP group number and yy is the different number of each gateway (01, 02, 03…). One of the routers in a GLBP group is elected as an AVG – Active Virtual Gateway. There is only one active AVG in a group, and its task is to respond to ARP requests sent to the virtual gateway IP address replying different virtual MAC addresses in response packets. GLBP allows the configured virtual IP address to be used on a physical interface. By default, the GLBP gateway preemptive scheme is disabled. A backup virtual gateway can become the AVG only if the current AVG fails, regardless of the priorities assigned to the virtual gateways. 

Q4. Refer to the exhibit. 

How can the EIGRP hello and hold time for Gig0/0 be changed to 5 and 15? 

A. No action is required, since Gig0/0 is not listed with a nondefault hello and hold time. 

B. Add the commands ip hello-interval eigrp 1 5 and ip hold-time eigrp 1 15 under interface Gig0/0. 

C. Add the commands hello-interval 5 and hold-time 15 under "af-interface Gig0/0" under the address family. 

D. Add the commands default hello-interval and default hold-time under the af-interface Gig0/0 statement under the address family. 

Answer:

Explanation: 

To configure the hello interval for an interface, use the hello-interval command in interface configuration mode To configure the hold time for an interface, use the hold-time command in interface configuration mode. 

Reference: http://www.cisco.com/c/en/us/td/docs/routers/crs/software/crs_r4-1/routing/command/reference/b_routing_cr41crs/b_routing_cr41crs_chapter_010.html#wp2 323069468 

Q5. Which three features are common to OSPF and IS-IS? (Choose three.) 

A. They both maintain a link-state database from which a Dijkstra-based SPF algorithm computes a shortest path tree. 

B. They both use DR and BDR in the broadcast network. 

C. They both use hello packets to form and maintain adjacencies. 

D. They both use NSSA and stub type areas to scale the network design. 

E. They both have areas to form a two-level hierarchical topology. 

Answer: A,C,E 

Q6. Which two statements are true about IPv6 multicast? (Choose two.) 

A. Receivers interested in IPv6 multicast traffic use IGMPv6 to signal their interest in the IPv6 multicast group. 

B. The PIM router with the lowest IPv6 address becomes the DR for the LAN. 

C. An IPv6 multicast address is an IPv6 address that has a prefix of FF00::/8. 

D. The IPv6 all-routers multicast group is FF02:0:0:0:0:0:0:2. 

Answer: C,D 

Explanation: 

Multicast addresses in IPv6 have the prefix ff00::/8. 

Well-known IPv6 multicast addresses 

Address 

Description 

ff02::1 

All nodes on the local network segment 

ff02::2 

All routers on the local network segment 

Reference: http://en.wikipedia.org/wiki/Multicast_address 

Q7. Which value is the maximum segment size if you start with an MTU of 1500 bytes and then remove the overhead of the Ethernet header, IP header, TCP header, and the MAC frame check sequence? 

A. 1434 bytes 

B. 1460 bytes 

C. 1458 bytes 

D. 1464 bytes 

Answer:

Q8. Which command drops packets with unknown source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value, and also causes the Security Violation counter to increment? 

A. switchport port-security violation protect 

B. switchport port-security violation drop 

C. switchport port-security violation shutdown 

D. switchport port-security violation restrict 

Answer:

Explanation: 

When configuring port security violation modes, note the following information: 

. protect—Drops packets with unknown source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value. 

. restrict—Drops packets with unknown source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value and causes the SecurityViolation counter to increment. 

. shutdown—Puts the interface into the error-disabled state immediately and sends an SNMP trap notification. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/port_sec.html 

Q9. DRAG DROP 

Drag and drop the BGP attribute on the left to the correct category on the right. 

Answer:  

Q10. Which statement describes the BGP add-path feature? 

A. It allows for installing multiple IBGP and EBGP routes in the routing table. 

B. It allows a network engineer to override the selected BGP path with an additional path created in the config. 

C. It allows BGP to provide backup paths to the routing table for quicker convergence. 

D. It allows multiple paths for the same prefix to be advertised. 

Answer:

Explanation: 

BGP routers and route reflectors (RRs) propagate only their best path over their sessions. The advertisement of a prefix replaces the previous announcement of that prefix (this behavior is known as an implicit withdraw). The implicit withdraw can achieve better scaling, but at the cost of path diversity. Path hiding can prevent efficient use of BGP multipath, prevent hitless planned maintenance, and can lead to MED oscillations and suboptimal hot-potato routing. Upon nexthop failures, path hiding also inhibits fast and local recovery because the network has to wait for BGP control plane convergence to restore traffic. The BGP Additional Paths feature provides a generic way of offering path diversity; the Best External or Best Internal features offer path diversity only in limited scenarios. The BGP Additional Paths feature provides a way for multiple paths for the same prefix to be advertised without the new paths implicitly replacing the previous paths. Thus, path diversity is achieved instead of path hiding. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bgp/configuration/xe-3s/irg-xe-3s-book/irg-additional-paths.html 

Q11. What is the new designation for the MPLS EXP (experimental) bits? 

A. QoS bits 

B. traffic class bits 

C. flow bits 

D. precedence bits 

Answer:

Explanation: 

To avoid misunderstanding about how this field may be used, it has become increasingly necessary to rename this field. This document changes the name of the EXP field to the "Traffic Class field" ("TC field"). In doing so, it also updates documents that define the current use of the EXP field. 

Reference: https://tools.ietf.org/html/rfc5462 

Q12. Refer to the exhibit. 

NHRP registration is failing; what might be the problem? 

A. invalid IP addressing 

B. fragmentation 

C. incorrect NHRP mapping 

D. incorrect NHRP authentication 

Answer:

Explanation: 

Configuring an authentication string ensures that only routers configured with the same string can communicate using NHRP. Therefore, if the authentication scheme is to be used, the same string must be configured in all devices configured for NHRP on a fabric 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_4/ip_addr/configuration/guide/hadnhrp.html#w p1055432 

Q13. You are configuring a DHCPv6 client for a DHCPv6 server with the prefix delegation feature. Which option is a result of the interface configuration when you enter the command ipv6 address autoconfig default? 

A. a static IPv6 default route pointing to the upstream DHCP server 

B. a static IPv6 default route pointing to the upstream DHCP relay 

C. a static IPv6 default route pointing to the upstream router 

D. a temporary stateless address, formed from the EUI-64 bit address and the prefix from the route advertisement of the upstream router 

Answer:

Q14. Refer to the exhibit. 

ASN 64523 has a multihomed BGP setup to ISP A and ISP B. Which BGP attribute can you set to allow traffic that originates in ASN 64523 to exit the ASN through ISP B? 

A. origin 

B. next-hop 

C. weight 

D. multi-exit discriminator 

Answer:

Explanation: 

MED is an optional nontransitive attribute. MED is a hint to external neighbors about the preferred path into an autonomous system (AS) that has multiple entry points. The MED is also known as the external metric of a route. A lower MED value is preferred over a higher value. Example at reference link below: 

Reference: http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/13759-37.html 

Q15. Where must the spanning-tree timers be configured if they are not using the default timers? 

A. They must be on the root bridge. 

B. They must be on any non-root bridge. 

C. Changing the default timers is not allowed. 

D. Timers must be modified manually on each switch. 

Answer: