400-101 Premium Bundle

400-101 Premium Bundle

CCIE Routing and Switching (v5.0) Certification Exam

4.5 
(14340 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Cisco 400-101 Free Practice Questions

Q1. Which three features does GETVPN support to improve deployment and scalability? (Choose three.) 

A. configuration of multiple key servers to work cooperatively 

B. allowing traffic to be discarded until a group member registers successfully 

C. local exceptions in the traffic classification ACL 

D. GDOI protocol configuration between group members and the key server 

E. redundant IPsec tunnels between group members and the key server 

F. redundant multicast replication streaming through the use of a bypass tunnel 

Answer: A,B,C 

Q2. Refer to the exhibit. 

If the network switch is configured as shown, which two statements about network traffic are true? (Choose two.) 

A. Traffic enters the shaper on a FIFO basis. 

B. Traffic enters the shaper on a weighted fair queueing basis. 

C. Drop behavior is random for traffic in excess of 6 Mbps. 

D. Voice traffic is given priority until it reaches 1.5 Mbps. 

E. Voice traffic is given priority until it reaches 6 Mbps. 

Answer: A,D 

Explanation: 

A. Serial interfaces at E1 (2.048 Mbps) and below use weighted fair queueing (WFQ) by default. Other interfaces use first-in first-out (FIFO) by default. 

D. Voice traffic is given priority up to 25% of the shape average value, which is 6000000, so 25% of 6 Mbps is 1.5 Mbps. 

Q3. What is the purpose of EIGRP summary leaking? 

A. to allow a summary to be advertised conditionally on specific criteria 

B. to allow a component of a summary to be advertised in addition to the summary 

C. to allow overlapping summaries to exist on a single interface 

D. to modify the metric of the summary based on which components of the summary are operational 

Answer:

Explanation: 

When you do manual summarization, and still you want to advertise some specific routes to the neighbor, you can do that using leak-map. Please read more about leaking routes here. 

http://www.cisco.com/c/en/us/td/docs/ios/iproute_eigrp/command/reference/ire_book/ire_i1. html#wp1037685. 

Q4. DRAG DROP 

Drag and drop the PPPoE packet type on the left to the corresponding description on the right. 

Answer:  

Q5. Which two statements are true about IS-IS? (Choose two.) 

A. IS-IS DIS election is nondeterministic. 

B. IS-IS SPF calculation is performed in three phases. 

C. IS-IS works over the data link layer, which does not provide for fragmentation and reassembly. 

D. IS-IS can never be routed beyond the immediate next hop. 

Answer: C,D 

Explanation: 

IS-IS runs directly over the data link alongside IP. On Ethernet, IS-IS packets are always 802.3 frames, with LSAPs 0xFEFE while IP packets are either Ethernet II frames or SNAP frames identified with the protocol number 0x800. OSPF runs over IP as protocol number 89. 

IS-IS runs directly over layer 2 and hence: 

-cannot support virtual links unless some explicit tunneling is implemented 

-packets are kept small so that they don't require hop-by-hop fragmentation 

-uses ATM/SNAP encapsulation on ATM but there are hacks to make it use VcMux encapsulation 

-some operating systems that support IP networking have been implemented to differentiate Layer 3 packets in kernel. Such Oss require a lot of kernel modifications to support IS-IS for IP routing. 

-can never be routed beyond the immediate next hop and hence shielded from IP spoofing and similar Denial of Service attacks. 

Reference: https://tools.ietf.org/html/draft-bhatia-manral-diff-isis-ospf-00 

Q6. You are configuring a DMVPN hub to perform CBWFQ on a per-spoke basis. Which information is used to identify the spoke? 

A. the NHRP network ID 

B. the spoke tunnel source IP 

C. the spoke tunnel interface IP address 

D. the NHRP group 

Answer:

Q7. Refer to the exhibit. 

Which log levels are enabled for the console? 

A. informational only 

B. informational and debugging 

C. informational, debugging, notifications, warnings, errors, critical, alerts, and emergencies 

D. informational, notifications, warnings, errors, critical, alerts, and emergencies 

Answer:

Q8. Which three statements are true about PPP CHAP authentication? (Choose three.) 

A. PPP encapsulation must be enabled globally. 

B. The LCP phase must be complete and in closed state. 

C. The hostname used by a router for CHAP authentication cannot be changed. 

D. PPP encapsulation must be enabled on the interface. 

E. The LCP phase must be complete and in open state. 

F. By default, the router uses its hostname to identify itself to the peer. 

Answer: D,E,F 

Explanation: 

Point-to-Point Protocol (PPP) authentication issues are one of the most common causes for dialup link failures. This document provides some troubleshooting procedures for PPP authentication issues. 

Prerequisites 

. Enable PPP encapsulation 

. The PPP authentication phase does not begin until the Link Control Protocol (LCP) phase is complete and is in the open state. If debug ppp negotiation does not indicate that LCP is open, troubleshoot this issue before proceeding. 

Note. By default, the router uses its hostname to identify itself to the peer. However, this CHAP username can be changed through the ppp chap hostname command. 

Reference: http://www.cisco.com/c/en/us/support/docs/wan/point-to-point-protocol-ppp/25647-understanding-ppp-chap.html 

Q9. Refer to the exhibit. 

Which statement is true? 

A. This is an MPLS TE point-to-multipoint LSP in an MPLS network. 

B. This is an MPLS TE multipoint-to-point LSP in an MPLS network. 

C. This is a point-to-multipoint LSP in an MPLS network. 

D. This is a multipoint-to-multipoint LSP in an MPLS network. 

Answer:

Explanation: 

Same example of this provided on slide 24 at the reference link below: 

Reference: “mVPN Deployment Models” Cisco Live Presentation 

http://d2zmdbbm9feqrf.cloudfront.net/2014/eur/pdf/BRKIPM-2011.pdf, slide 24 

Q10. Which two statements about IP SLAs are true? (Choose two.) 

A. They are Layer 2 transport independent. 

B. Statistics are collected and stored in the RIB. 

C. Data for the delay performance metric can be collected both one-way and round-trip. 

D. Data can be collected with a physical probe. 

E. They are used primarily in the distribution layer. 

Answer: A,E 

Q11. Refer to the exhibit. 

Which statement describes the effect on the network if FastEthernet0/1 goes down temporarily? 

A. FastEthernet0/2 forwards traffic only until FastEthernet0/1 comes back up. 

B. FastEthernet0/2 stops forwarding traffic until FastEthernet0/1 comes back up. 

C. FastEthernet0/2 forwards traffic indefinitely. 

D. FastEthernet0/1 goes into standby. 

Answer:

Explanation: 

Use the switchport backup interface interface configuration command on a Layer 2 interface to configure Flex Links, a pair of interfaces that provide backup to each other. Use the no form of this command to remove the Flex Links configuration. With Flex Links configured, one link acts as the primary interface and forwards traffic, while the other interface is in standby mode, ready to begin forwarding traffic if the primary link shuts down. The interface being configured is referred to as the active link; the specified interface is identified as the backup link. The feature provides an alternative to the Spanning Tree Protocol (STP), allowing users to turn off STP and still retain basic link redundancy. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/command/reference/2960ComRef/cli3.html#wp3269214 

Q12. Now that we’ve generated the key, our next step would be to configure our vty lines for SSH access and specify which database we are going to use to provide authentication to the device. The local database on the router will do just fine for this example. 

LabRouter(config)#line vty 0 4 

LabRouter(config-line)#login local 

LabRouter(config-line)#transport input ssh 

5. You will need to create an account on the local router’s database to be used for authenticating to the device. This can be accomplished with these commands. LabRouter(config)#username XXXX privilege 15 secret XXXX 

Reference: http://blog.pluralsight.com/configure-secure-shell-ssh-on-cisco-router 

Answer:

Q13. Refer to the exhibit. 

The device with this configuration is unable to reach network 172.31.31.0/24. The next hop router has been verified to have full connectivity to the network. Which two actions can you take to establish connectivity to the network? (Choose two.) 

A. Create a static route to 172.16.199.0 using the address of the next hop router. 

B. Create a default route to the link address of the next hop router. 

C. Create a static route to the loopback address of the next hop router. 

D. Create a default route to 172.16.199.9. 

E. Modify the existing static route so that the next hop is 0.0.0.0. 

F. Replace the ip default-network command with the ip default-gateway command. 

Answer: A,B 

Explanation: 

Unlike the ip default-gateway command, you can use ip default-network when ip routing is enabled on the Cisco router. When you configure ip default-network the router considers routes to that network for installation as the gateway of last resort on the router. 

For every network configured with ip default-network, if a router has a route to that network, that route is flagged as a candidate default route. However, in this case if the router does not a route to the drfault network of 172.16.199.9, then you would need to ensure that this route exisits by creating a static route to 172.16.199.0 using the address of the next hop router, or simply create a default route using the address of the next hop router. 

Q14. DRAG DROP 

Drag and drop the OSPF network type on the left to the correct category of timers on the right. 

Answer:  

Q15. When you implement CoPP on your network, what is its default action? 

A. permit all traffic 

B. rate-limit bidirectional traffic to the control plane 

C. drop management ingress traffic to the control plane 

D. monitor ingress and egress traffic to the control plane by using access groups that are applied to the interface 

E. block all traffic 

Answer: