P.S. Pinpoint 400-101 vce are available on Google Drive, GET MORE: https://drive.google.com/open?id=1VvIzODS28HT8b3bGvgHJT0ijNPTHd_ff
Question No: 2
Which action does route poisoning take that serves as a loop-prevention method?
A. It prohibits a router from advertising back onto the interface from which it was learned.
B. lt advertises a route with an unreachable metric back onto the interface from which it was
learned.
C. It immediately sends routing updates with unreachable metric to all devices.
D. It poisons the route by tagging it uniquely within the network.
Answer: C
Question No: 3
Refer to the exhibit.Which configuration must you apply to a router so that it can generate a log message in the given format?
A. service sequence-numbers
B service timestamps log datetime
B. service timestamps log uptime
C. service alignment logging
Answer: C
Question No: 4
Which two statements about 1Pv4 and 1Pv6 networks are true? (Choose two.)
A. ln IPv6, hosts perform fragmentation.
B. IPv6 uses a UDP checksum to verify packet integrity.
C. ln IPv6, routers perform fragmentation.
D. In IPv4 fragmentation is performed by the source of the packet.
E. IPv4 uses an optional checksum at the transport layer.
F. IPv6 uses a required checksum at the network layer.
Answer: A,B
Question No: 5
Refer to the exhibit.
After you applied this configuration to R1 and R 2 they failed to form an ISIS adjacency. Which reason for the problem is most likely true?
A. The network statements are mismatched
B. The IP subnets are mismatched
C. T he bandwidth is mismatched
D. The MTUs are mismatched
Answer: D
Question No: 6
Which technology does Cisco PfR use to collect passive monitoring statics?
A. NBAR
B. SNMP
C. Syslog
D. NetFlow
Answer: D
Question No: 7
Refer to the exhibit.
According to the given show line output, which type of line is connected to the router?
A. auxiliary
B. Telnet
C. terminal
D. Console
E. SSH
Answer: A
Question No: 8
Refer to the exhibit.
Routers A and Bare the edge devices at two different sites as shown. If
routers A and B have established an IPsec tunnel, which two statements about the network environment must be true? (Choose two)
A. The connection could have been authenticated with 802.1 x
B. The connection could have authenticated with a pre-shared key
C. RFC 1918 addresses are in use on the WAN interfaces on router A and router B
D. The connection could have been authenticated with MD5
E. Public IP addresses are in use on the WAN interfaces on router A and router B
Answer: B,E
Question No: 9
Refer to the exhibit. What is the meaning of the asterisk (*) in the LSP Seq Num column of this "show isis database" output?
A. The LSP originated on a router with an invalid hold time
B. The LSP originated on a L1-L2 type router
C. The LSP originated on the router where the command is being executed
D. The LSP originated on a router which is capable of wide metrics
Answer: D
Question No: 10
Which authentication types does OSPF support?
A. Null (or no authentication), clear text and MD5.
B. Clear text only
C. MD5only
D. MD5 and clear text
E. Null( or no authentication) and clear text
Answer: A
Question No: 11
Which two values are required to implement an EIGRP named configuration? (Choose two.)
A. Process-id
B. Router-id
C. Subnet-mask
D. Add ress-family
E. Virtual-instance-name
Answer: D,E
100% Far out Cisco 400-101 Questions & Answers shared by Allfreedumps, Get HERE: https://www.allfreedumps.com/400-101-dumps.html (New 911 Q&As)