400-101 Premium Bundle

400-101 Premium Bundle

CCIE Routing and Switching (v5.0) Certification Exam

4.5 
(38745 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
December 3, 2024Last update

Cisco 400-101 Free Practice Questions

Q1. DRAG DROP 

Drag and drop the OTV component on the left to the function it performs on the right. 

Answer:  

Q2. Refer to the exhibit. 

Which two statements about this capture are true? (Choose two.) 

A. It is set to run for five minutes. 

B. It continues to capture data after the buffer is full. 

C. It is set to run for a period of 00:03:26. 

D. It captures data only until the buffer is full. 

E. It is set to use the default buffer type. 

Answer: A,B 

Q3. Which two statements about MAC Authentication Bypass are true? (Choose two.) 

A. Traffic from an endpoint is authorized to pass after MAB authenticates the MAC address of the endpoint. 

B. During the learning stage, the switch examines multiple packets from the endpoint to determine the MAC address of the endpoint. 

C. After the switch learns the MAC address of the endpoint, it uses TACACS+ to authenticate it. 

D. After learning a source MAC address, it sends the host a RADIUS Account-Request message to validate the address. 

E. The MAC address of a device serves as its user name and password to authenticate with a RADIUS server. 

Answer: A,E 

Q4. DRAG DROP 

Drag and drop the Cisco IOS XE subpackage on the left to the function it performs on the right. 

Answer:  

Q5. Refer to the exhibit. 

What is the meaning of the asterisk (*) in the output? 

A. PIM neighbor 10.1.5.6 is the RPF neighbor for the group 232.1.1.1 for the shared tree. 

B. PIM neighbor 10.1.5.6 is the one that is seen as the RPF neighbor when performing the command show ip rpf 10.1.4.7. 

C. PIM neighbor 10.1.5.6 is the winner of an assert mechanism. 

D. The RPF neighbor 10.1.5.6 is invalid. 

Answer:

Explanation: 

show ip mroute 

Field 

Descriptions 

Field Description 

RPF neighbor or RPF nbr 

IP address of the upstream router to the source. Tunneling indicates that this router is sending data to the RP encapsulated in register packets. 

The hexadecimal number in parentheses indicates to which RP it is registering. Each bit indicates a different RP if multiple RPs per group are used. If an asterisk (*) appears after the IP address in this field, the RPF neighbor has been learned through an assert. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/ipmulti/command/reference/fiprmc_r/1rfmult 3.html 

Q6. Refer to the exhibit. 

The customer wants to use IP SLA to create a failover to ISP2 when both Ethernet connections to ISP1 are down. The customer also requires that both connections to ISP1 are utilized during normal operations. 

Which IP route configuration accomplishes these requirements for the customer? 

A. ip route 0.0.0.0 0.0.0.0 192.168.0.1 track 1 

ip route 0.0.0.0 0.0.0.0 192.168.1.1 track 2 

ip route 0.0.0.0 0.0.0.0 192.168.2.1 track 3 

B. ip route 0.0.0.0 0.0.0.0 192.168.0.1 track 1 

ip route 0.0.0.0 0.0.0.0 192.168.1.1 track 2 

ip route 0.0.0.0 0.0.0.0 192.168.2.1 track 4.100 

C. ip route 0.0.0.0 0.0.0.0 192.168.0.1 track 1 

ip route 0.0.0.0 0.0.0.0 192.168.1.1 track 2 

ip route 0.0.0.0 0.0.0.0 192.168.2.1 track 3.100 

D. ip route 0.0.0.0 0.0.0.0 192.168.0.1 track 1 1 

ip route 0.0.0.0 0.0.0.0 192.168.1.1 track 2 2 

ip route 0.0.0.0 0.0.0.0 192.168.2.1 track 3 3 

Answer:

Q7. Refer to the exhibit. 

Your organization has two offices, Site 1 and Site 2, which are connected by a provider 

backbone, as shown. Where must you configure an attachment circuit to allow the two sites to connect over a Layer 2 network using L2TPv3? 

A. PE Site 1 Fa1/0 and PE Site 2 Fa0/0 

B. CE Site 1 Fa0/0 and CE Site 2 Fa0/0 

C. PE Site 1 Se0/0 and PE Site 2 Se0/0 

D. CE Site 1 Fa0/0 and PE Site 2 Se0/0 

Answer:

Q8. Refer to the exhibit. 

While reviewing a log file on a router with this NTP configuration, you note that the log entries of the router display a different time than the NTP time. 

Which action can you take to correct the problem? 

A. Add the localtime keyword to the service timestamps log datetime statement. 

B. Add the msec keyword to the service timestamps log datetime statement. 

C. Add the statement ntp broadcast to the NTP configuration of the neighboring router. 

D. Configure the router to be the NTP master. 

E. Remove the datetime keyword from the service timestamps log datetime statement. 

Answer:

Q9. Refer to the exhibit. 

If a Layer 3 switch running OSPF in a VRF-lite configuration reports this error, which action can you take to correct the problem? 

A. Set mls cef maximum-routes in the global configuration. 

B. Add the vrf-lite capability to the OSPF configuration. 

C. Upgrade the Layer 3 switch to a model that can support more routes. 

D. Configure the control plane with a larger memory allocation to support the Cisco Express Forwarding Information Base. 

Answer:

Q10. Which TCP mechanism prevents the sender from sending data too quickly for the receiver to process? 

A. Congestion control 

B. Error detection 

C. Selective acknowledgement 

D. Flow control 

Answer:

Explanation: 

In data communications, flow control is the process of managing the rate of data transmission between two nodes to prevent a fast sender from overwhelming a slow receiver. It provides a mechanism for the receiver to control the transmission speed, so that the receiving node is not overwhelmed with data from transmitting node. 

Reference: http://en.wikipedia.org/wiki/Flow_control_(data) 

Q11. RIPv2 is enabled on a router interface. The "neighbor" command is also configured with a specific IP address. Which statement describes the effect of this configuration? 

A. RIP stops sending multicast packets on that interface. 

B. RIP starts sending only unicast packets on that interface. 

C. RIP starts ignoring multicast packets on that interface. 

D. RIP starts sending unicast packets to the specified neighbor, in addition to multicast packets. 

Answer:

Q12. DRAG DROP 

Drag and drop the MPLS term on the left to the function it performs on the right. 

Answer:  

Q13. DRAG DROP 

Drag and drop each BGP feature on the left to the corresponding function it performs on the right. 

Answer:  

Q14. Refer to the exhibit. 

Why is the neighbor relationship between R2 and R4 shown as ES-IS? 

A. because there is an MTU mismatch between R2 and R4 

B. because interface S3/0 of R4 is configured as L1/L2 

C. because interface S3/0 of R2 is configured as L1 

D. because there is a hello interval mismatch between R2 and R4 

Answer:

Explanation: 

With IS-IS we will see ES-IS when one of the following is true: 

. uk.co.certification.simulator.questionpool.PList@138b7160 

So in this question because we do not know about the other side’s “show CLNS neighbor” A must be the better choose. 

Q15. Which two statements about 802.1Q tunneling are true? (Choose two.) 

A. It requires a system MTU of at least 1504 bytes. 

B. The default configuration sends Cisco Discovery Protocol, STP, and VTP information. 

C. Traffic that traverses the tunnel is encrypted. 

D. It is supported on private VLAN ports. 

E. MAC-based QoS and UDLD are supported on tunnel ports. 

F. Its maximum allowable system MTU is 1546 bytes. 

Answer: A,E