400-101 Premium Bundle

400-101 Premium Bundle

CCIE Routing and Switching (v5.0) Certification Exam

4.5 
(1335 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

Cisco 400-101 Free Practice Questions

Q1. Which neighbor-discovery message type is used to verify connectivity to a neighbor when the link-layer address of the neighbor is known? 

A. neighbor solicitation 

B. neighbor advertisement 

C. router advertisement 

D. router solicitation 

Answer:

Explanation: 

IPv6 Neighbor Solicitation Message A value of 135 in the Type field of the ICMP packet header identifies a neighbor solicitation message. Neighbor solicitation messages are sent on the local link when a node wants to determine the link-layer address of another node on the same local link (see the figure below). When a node wants to determine the link-layer address of another node, the source address in a neighbor solicitation message is the IPv6 address of the node sending the neighbor solicitation message. The destination address in the neighbor solicitation message is the solicited-node multicast address that corresponds to the IPv6 address of the destination node. The neighbor solicitation message also includes the link-layer address of the source node. 

Figure 1. IPv6 Neighbor Discovery: Neighbor Solicitation Message 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_basic/configuration/xe-3s/ip6b-xe-3s-book/ip6-neighb-disc-xe.html 

Q2. Which two tunneling techniques determine the IPv4 destination address on a per-packet basis? (Choose two.) 

A. 6to4 tunneling 

B. ISATAP tunneling 

C. manual tunneling 

D. GRE tunneling 

Answer: A,B 

Explanation: Tunnel Configuration Parameters by Tunneling Type 

Tunneling Type 

Tunnel Configuration Parameter 

Tunnel Mode 

Tunnel Source 

Tunnel Destination 

Interface Prefix or Address 

Manual 

ipv6ip 

An IPv4 address, or a reference to an interface on which IPv4 is configured. 

An IPv4 address. 

An IPv6 address. 

GRE/IPv4 

gre ip 

An IPv4 address. 

An IPv6 address. 

IPv4-compatible 

ipv6ip auto-tunnel 

Not required. These are all point-to-multipoint tunneling types. The IPv4 destination address is calculated, on a per-packet basis, from the IPv6 destination. 

Not required. The interface address is generated as ::tunnel-source/96. 

6to4 

ipv6ip 6to4 

An IPv6 address. The prefix must embed the tunnel source IPv4 address 

ISATAP 

ipv6ip isatap 

An IPv6 prefix in modified eui-64 format. The IPv6 address is generated from the prefix and the tunnel source IPv4 address. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/ipv6/configuration/guide/12_4t/ipv6_12_4t_book/i p6-tunnel.html 

Q3. Which statement about passive interfaces is true? 

A. The interface with the OSPF passive interface configuration appears as a not-so-stubby network. 

B. The interface with the EIGRP passive interface configuration ignores routes after the exchange of hello packets. 

C. The interface with the IS-IS passive interface configuration sends the IP address of that interface in the link-state protocol data units. 

D. Passive interface can be configured on the interface for IS-IS. 

Answer:

Explanation: 

With IS-IS, passive interfaces are used to prevent unnecessary LSA packets out that interface, but the IP address of passive interfaces are still included in updates going out the other interfaces. This behavior is what enables the best practice of configuring loopback interfaces as passive, but still having the loopback be reachable. 

Q4. Refer to the exhibit. 

Which additional information must you specify in this configuration to capture NetFlow traffic? 

A. ingress or egress traffic 

B. the number of cache entries 

C. the flow cache active timeout 

D. the flow cache inactive timeout 

Answer:

Explanation: 

Configuring NetFlow 

Perform the following task to enable NetFlow on an interface. SUMMARY STEPS 

1. enable 

2. configure terminal 

3. interface type number 

4. ip flow {ingress | egress} 

5. exit 

6. Repeat Steps 3 through 5 to enable NetFlow on other interfaces. 

7. end 

DETAILED STEPS 

Command or Action 

Purpose 

Step 1 

enable 

Example: 

Router> enable Enables privileged EXEC mode. . 

Enter your password if prompted. 

Step 2 

configure terminal Example: 

........

Example: 

Router(config)# interface ethernet 0/0 

Specifies the interface that you want to enable NetFlow on and enters interface configuration mode. 

Step 4 

ip flow {ingress | egress} 

Example: 

Router(config-if)# ip flow ingress 

Enables NetFlow on the interface. 

. ingress—Captures traffic that is being received by the interface 

. egress—Captures traffic that is being transmitted by the interface 

Step 5 

exit 

Example: 

Router(config-if)# exit 

(Optional) Exits interface configuration mode and enters global configuration mode. 

Note 

You need to use this command only if you want to enable NetFlow on another interface. 

Step 6 

Repeat Steps 3 through 5 to enable NetFlow on other interfaces. 

This step is optional. 

Step 7 

end 

Example: 

Router(config-if)# end Exits the current configuration mode and returns to privileged EXEC mod 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/netflow/configuration/guide/12_2sr/nf_12_2sr_boo k/cfg_nflow_data_expt.html 

Q5. How does having an EIGRP feasible successor speed up convergence? 

A. EIGRP sends queries only if there is a feasible successor, which decreases the number of routers that are involved in convergence. 

B. EIGRP sends queries only if there is not a feasible successor, which causes less control traffic to compete with data. 

C. EIGRP immediately installs the loop-free alternative path in the RIB. 

D. EIGRP preinstalls the feasible successor in the RIB in all cases, which causes traffic to switch more quickly. 

Answer:

Explanation: 

Feasible Successor 

. A next-hop router that serves as backup to the current successor. 

. The condition is that the said router’s AD (or RD) is less than the FD of the current successor route. 

. Once the feasible successor is selected, they are placed in the topology table. If a change in topology occurs which requires a new route, DUAL looks for the feasible successor and uses it as new route immediately, resulting in fast convergence. 

Reference: http://routemyworld.com/2008/07/page/2/ 

Q6. What are two benefits of Per-Tunnel QoS for DMVPN? (Choose two.) 

A. The administrator can configure criteria that, when matched, can automatically set up QoS for each spoke as it comes online. 

B. Traffic from each spoke to the hub can be regulated individually. 

C. When traffic exceeds a configurable threshold, the spokes can automatically set up QoS with the hub. 

D. The hub can send large packets to a spoke during allotted timeframes. 

E. The hub can be regulated to prevent overloading small spokes. 

Answer: A,E 

Q7. DRAG DROP 

Drag and drop the EIGRP query condition on the left to the corresponding action taken by the router on the right. 

Answer:  

Q8. Which service is disabled by the no service tcp-small-servers command? 

A. the finger service 

B. the Telnet service 

C. the Maintenance Operation Protocol service 

D. the chargen service 

Answer:

Explanation: 

The TCP small servers are: . Echo: Echoes back whatever you type through the telnet x.x.x.x echo command. 

. Chargen: Generates a stream of ASCII data. Use the telnet x.x.x.x chargen Command.

 . DiscarD. Throws away whatever you type. Use the telnet x.x.x.x discard command. 

. DaytimE. Returns system date and time, if it is correct. It is correct if you run Network Time Protocol (NTP), or have set the date and time manually from the exec level. Use the telnet x.x.x.x daytime command. 

Reference: http://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-software-releases-110/12815-23.html 

Q9. Which two statements about OSPF route types are true? (Choose two.) 

A. The cost of an external type 2 route is the sum of the external and internal costs. 

B. The cost of an external type 2 route is the same as the external cost. 

C. Intra-area routes originate outside of their area. 

D. Inter-area routes originate inside their area. 

E. The cost of an external type 1 route is the same as the internal cost. 

F. For routes to the same destination, external type 1 routes are preferred over external type 2 routes. 

Answer: B,F 

Explanation: 

External routes fall under two categories, external type 1 and external type 2. The difference between the two is in the way the cost (metric) of the route is being calculated. The cost of a type 2 route is always the external cost, irrespective of the interior cost to reach that route. A type 1 cost is the addition of the external cost and the internal cost used to reach that route. A type 1 route is always preferred over a type 2 route for the same destination. 

Reference: http://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/7039-1.html 

Q10. Which three options are characteristics of a Type 10 LSA? (Choose three.) 

A. It is an area-local, opaque LSA. 

B. Data is flooded to all routers in the LSA scope. 

C. It is used for traffic-engineering extensions to OSPF. 

D. It is a link-local, opaque LSA. 

E. Data is flooded only to the routers in the LSA scope that understand the data. 

F. It is used for traffic-engineering extensions to LDP. 

Answer: A,B,C 

Q11. For which feature is the address family "rtfilter" used? 

A. Enhanced Route Refresh 

B. MPLS VPN filtering 

C. Route Target Constraint 

D. Unified MPLS 

Answer:

Explanation: 

With Multiprotocol Label Switching (MPLS) VPN, the internal Border Gateway Protocol (iBGP) peer or Route Reflector (RR) sends all VPN4 and/or VPN6 prefixes to the PE routers. The PE router drops the VPN4/6 prefixes for which there is no importing VPN routing and forwarding (VRF). This is a behavior where the RR sends VPN4/6 prefixes to the PE router, which it does not need. This is a waste of processing power on the RR and the PE and a waste of bandwidth. With Route Target Constraint (RTC), the RR sends only wanted VPN4/6 prefixes to the PE. 'Wanted' means that the PE has VRF importing the specific prefixes. RFC 4684 specifies Route Target Constraint (RTC). The support is through a new address family rtfilter for both VPNv4 and VPNv6. 

Reference: http://www.cisco.com/c/en/us/support/docs/multiprotocol-label-switching-mpls/mpls/116062-technologies-technote-restraint-00.html 

Q12. Which two statements are true about IPv6 multicast? (Choose two.) 

A. Receivers interested in IPv6 multicast traffic use IGMPv6 to signal their interest in the IPv6 multicast group. 

B. The PIM router with the lowest IPv6 address becomes the DR for the LAN. 

C. An IPv6 multicast address is an IPv6 address that has a prefix of FF00::/8. 

D. The IPv6 all-routers multicast group is FF02:0:0:0:0:0:0:2. 

Answer: C,D 

Explanation: 

Multicast addresses in IPv6 have the prefix ff00::/8. 

Well-known IPv6 multicast addresses 

Address 

Description 

ff02::1 

All nodes on the local network segment 

ff02::2 

All routers on the local network segment 

Reference: http://en.wikipedia.org/wiki/Multicast_address 

Q13. Refer to the exhibit. 

Which configuration must you apply to router R2 to enable BFD?

A) 

B) 

C) 

D) 

A. Exhibit A 

B. Exhibit B 

C. Exhibit C 

D. Exhibit D 

Answer:

Q14. Where must the spanning-tree timers be configured if they are not using the default timers? 

A. They must be on the root bridge. 

B. They must be on any non-root bridge. 

C. Changing the default timers is not allowed. 

D. Timers must be modified manually on each switch. 

Answer:

Q15. Which two statements about IPsec VTI implementation are true? (Choose two.) 

A. The IKE SA can be bound to the VTI and the crypto map. 

B. The transform set can be configured only in tunnel mode. 

C. SVTIs support only a single IPsec SA. 

D. SVTIs support IPv4 packets that carry IPv6 packets. 

Answer: B,C