Lead2pass 2017 November New Cisco 400-101 Exam Dumps!
100% Free Download! 100% Pass Guaranteed!
There is no need to hassle if you are stuck in the 400-101 exam difficulties, Lead2pass will assist you right through 400-101 exam with 400-101 PDF and VCE dumps. Lead2pass delivers the most comprehensive 400-101 exam preparation material, covering each and every aspect of 400-101 exam curriculum. We ensure you 100% success in 400-101 exam.
Following questions and answers are all new published by Cisco Official Exam Center: https://www.lead2pass.com/400-101.html
What is the initial BFD state?
Which two configuration options are available for PIM snooping? (Choose two.)
A. On a specific interface on the device.
B. On a range of interfaces on the device.
C. Under the VLAN in VLAN configuration mode.
D. Globally on the device.
E. Under the SVI for the corresponding VLAN.
Which two statements about the passive-interface command issued under EIGRP are true? (Choose two)
A. It configures the interface to use unicast messages to establish EIGRP neighbor relationships
B. It disables processing of incoming hello messages
C. It allows incoming routing updates to be received but disables outing routing updates
D. If it is enabled globally under EIGRP on the device, it can be disabled for individual interfaces to allow those interfaces to remain active
E. It configures the device to advertise only connected interfaces to neighbors with EIGRP
Which two options are requirements for Control-Plane Policing? (Choose two.)
A. Cisco Express Forwarding must be enabled globally.
B. Cisco Discovery Protocol must be disabled in the control plane.
C. A crypto policy must be installed.
D. A loopback address must be configured for device access.
E. A class map must be configured to identify traffic.
Which two elements are required to define a class-map? (Choose two.)
A. A traffic-class name
B. A series of match commands.
C. A traffic policy name
D. A series of set command
E. A command such as bandwidth, fair-queue, or random-detect to enable a QoS option.
F. An attachment to an interface
Which technology can be used to secure the core of an STP domain?
B. BPDU guard
C. BPDU filter
D. root guard
Which two statements about DHCP operations are true? (Choose two)
A. When the DHCP relay agent receives a DHCP messages, If generates a new DHCP message to transmit
B. The client uses option 125 in a DHCPDISCOVER message to discover the DHCP server
C. The DHCP server inserts option 150 when it sends a DHCPOFFER message
D. The client uses TTL to discover a DHCP server and obtain a leased IP address
E. The DHCP relay agent can insert option 82 with additional information about the client identity
Refer to the exhibit. Which two statements about this network are true? (Choose two)
A. It allows successful traceroute operations from R3 to R2
B. It allows successful traceroute operation from R1 to R2
C. It generates syslog messages for all discarded packet
D. It is configured with control-plane policing in silent mode
E. It is configured as distributed control-plane services
In an MPLS-VPN environment, what is the effect of configuring an identical set of route targets for a particular VRF but then configuring nonidentical RD across multiple PE devices?
A. The routes are rejected by remote PE because they have a different RD than its routes.
B. The routes propagate to the remote PE, but the PE never installs them in its forwarding table.
C. The routes are correctly managed by the control plane, but there are instances where routes take up twice as much memory.
D. The routes are not sent to any remote PE with a different RD.
Which two are features of DMVPN? (Choose two)
A. It supports multicast traffic
B. It does not supports spoke routers behind dynamic NAT
C. It only supports remote peers with statically assigned addresses
D. It offers configuration reduction
E. It requires IPsec encryption
What are the two EEM event subscribers? (Choose two)
For which feature is the address family “rtfilter” used?
A. Enhanced Route Refresh
B. MPLS VPN filtering
C. Route Target Constraint
D. Unified MPLS
What is a major difference between Unidirectional Link Detection (UDLD) and Bidirectional Forwarding Detection (BFD)?
A. UDLD operates at Layer 3 and detects the failure of the Layer 3 connectivity between two routers. BFD operates at Layer 3 and detects forwarding path failures over multiple Layer 2 hops between two routers.
B. UDLD operates at Layer 2 and detects failure of physical links. BFD operates at Layer 3 and detects failure of forwarding paths, which may transit multiple Layer2 hops, between two routers.
C. UDLD operates at Layer 2 and detects failure of physical links BFD operates at Layer 2 and detects failure of a direct link between two routers or switches.
D. UDLD operates at Layer 3 and detects failure of physical links between adjacent routers. BFD operates at Layer 3 and detects failure of a forwarding path, which may transit multiple Layer 2 hops , between two routers.
Which two events occur when a packets is decapsulated in a GRE tunnel? (Choose two.)
A. The source IPv4 address in the IPv4 payload is used to forward the packet.
B. The destination IPv4 address in the IPv4 payload is used to forward of the packets.
C. The version field of the GRE header is incremented.
D. The GRE keepalive mechanism is reset.
E. The TTL of the payload packet is incremented.
F. The TTL of the payload is discremented.
Which three actions are required when configuration NAT-PT? (Choose three)
A. Specify a ::/48 prefix that will map to a MAC address.
B. Specify a::/32 prefix that will map to an IPV6 address.
C. Specify an IPv6-to-IPv4 translation.
D. Enable NAT-PT Globally.
E. Specify a ::/96 prefix that will map to an IPv4 address.
F. Specify an IPv4-to-IPv6 translation.
Refer to the exhibit. When a user attempted to log in to R1 via the console, the logon was successful but the user was placed in user EXEC mode instead of privileged EXEC mode.
What action can you take to correct the problem?
A. Configure the privilege level 15 command under line console 0
B. Configure the username jdoe privilege 15 password 0 cisco command under the global configuration
C. Configure the aaa authentication login default local enable command under the global configuration
D. Configure the enable secret level 15 cisco command under the global configuration
E. Configure the aaa authentication console command under the global configuration
Refer the exhibit. What are two effects of the given network configuration? (Choose two)
A. The 192.168.12.0/24 network is added to the R3 database.
B. R1 and R2 fail to form an adjacency.
C. R2 and R3 fail to form an adjacency.
D. R2 advertises the 192.168.23.0/24 network.
E. R2 advertise the 220.127.116.11/24 network.
F. The 192.168.12.0/24 network to the R3 route table.
Which two statements are true about IS-IS? (Choose two.)
A. IS-IS DIS election is nondeterministic.
B. IS-IS SPF calculation is performed in three phases.
C. IS-IS works over the data link layer, which does not provide for fragmentation and reassembly.
D. IS-IS can never be routed beyond the immediate next hop.
Drag and Drop Question
Drag and drop each IS-IS PDU type from the left onto its purpose on the right.
Drag and Drop Question
Drag and drop the PPPoE packet type on the left of the corresponding description on the right.
More free Lead2pass 400-101 exam new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDZ0lrZUFjNWtFYlk
We highly recommend our 400-101 dumps. Comparing with others’, Lead2pass is the most credible and authentic source of information on 400-101 exam and we strive to keep our 400-101 dumps up-to-date and reliable on a consistent basis. Our exam preparation material is rich in variety. We offer 400-101 PDF format and 400-101 practice test with free VCE player. That’s the reason why many candidates choose Lead2pass.
2017 Cisco 400-101 (All 969 Q&As) exam dumps (PDF&VCE) from Lead2pass: