♥♥ 2017 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 400-101 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 400-101 Exam Dumps (PDF & VCE):
Available on: http://www.exam.com/400-101-dumps.html

Exam Code: exam 400 101 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CCIE Routing and Switching (v5.0)
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass ccie 400 101 dumps Exam.

Q11. Which two statements about device access control are true? (Choose two.) 

A. The AUX port is displayed as type tty in the output of the show line command. 

B. VTY lines are associated with physical interfaces on a network device. 

C. MPP restricts device-management access to interfaces that are configured under the control plane host configuration. 

D. The enable password command sets an MD5 one-way encrypted password. 

E. The console port supports hardware flow control 

Answer: C,E 

Q12. Refer to the exhibit. 

Which statement about configuring the switch to manage traffic is true? 

A. The switchport priority extend cos command on interface FastEthernet0/0 prevents traffic to and from the PC from taking advantage of the high-priority data queue that is assigned to the IP phone. 

B. The switchport priority extend cos command on interface FastEthernet0/0 enables traffic to and from the PC to use the high priority data queue that is assigned to the IP phone. 

C. When the switch is configured to trust the CoS label of incoming traffic, the trusted boundary feature is disabled automatically. 

D. The mls qos cos override command on interface FastEthernet0/0 configures the port to trust the CoS label of traffic to and from the PC. 



In some situations, you can prevent a PC connected to the Cisco IP Phone from taking advantage of a high-priority data queue. You can use the switchport priority extend cos interface configuration command to configure the telephone through the switch CLI to override the priority of the traffic received from the PC. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2950/software/release/12-1_22_ea2/configuration/guide/2950scg/swqos.html 

Q13. Which two statements about PBR route maps are true? (Choose two.) 

A. They can use extended ACLs to identify traffic. 

B. They can route unicast traffic without interface-level classification. 

C. They can be applied to both ingress and egress traffic. 

D. They can classify traffic based on prefix-lists. 

E. They can set the metric and IP precedence bits. 

Answer: A,B 


Drag and drop the DSCP PHB on the left to the corresponding binary representation on the right. 


Q15. Which two statements about reverse ARP are true? (Choose two.) 

A. Its servers require static mappings. 

B. It works with AutoInstall to configure new devices. 

C. It provides IP addresses for subnet masks. 

D. It provides IP addresses for default gateways. 

E. It requires less maintenance than DHCP. 

Answer: A,B 

Q16. For which three routing protocols can Cisco PfR provide direct route control? (Choose three.) 





E. static routing 


Answer: C,D,E 


Q. Can you elaborate more on the Parent Route and why it's so important to PfR? 

A. Yes. For any route that PfR modifies or controls (BGP, Static, PIRO, EIGRP, PBR), having a Parent prefix in the routing table eliminates the possibility of a routing loop occurring. This is naturally a good thing to prevent in routed networks. 

Reference: http://docwiki.cisco.com/wiki/Performance_Routing_FAQs#Route_Control 

Q17. Refer to the exhibit. 

R2 is unable to access the network between R1 and R3. Which option is a possible reason for the failure? 

A. The seed metric for redistributing into RIP on R3 is missing. 

B. The OSPF processes on R2 and R3 are different. 

C. Auto-summary is misconfigured under the RIP process of R3. 

D. The subnet mask on the link between R2 and R3 is smaller than /30. 

E. The wildcard mask on R3 is misconfigured. 



The problem is that RIP requires a seed metric to be specified when redistributing routes into that protocol. A seed metric is a "starter metric" that gives the RIP process a metric it can work with. The OSPF metric of cost is incomprehensible to RIP, since RIP's sole metric is hop count. 

Reference: http://www.thebryantadvantage.com/CCNP%20Certification%20BSCI%20Exam%20Tutoria l%20Route%20Redistribution%20Seed%20Metric.htm 

Q18. Refer to the exhibit. 

Which additional information must you specify in this configuration to capture NetFlow traffic? 

A. ingress or egress traffic 

B. the number of cache entries 

C. the flow cache active timeout 

D. the flow cache inactive timeout 



Configuring NetFlow 

Perform the following task to enable NetFlow on an interface. SUMMARY STEPS 

1. enable 

2. configure terminal 

3. interface type number 

4. ip flow {ingress | egress} 

5. exit 

6. Repeat Steps 3 through 5 to enable NetFlow on other interfaces. 

7. end 


Command or Action 


Step 1 



Router> enable Enables privileged EXEC mode. . 

Enter your password if prompted. 

Step 2 

configure terminal Example: 



Router(config)# interface ethernet 0/0 

Specifies the interface that you want to enable NetFlow on and enters interface configuration mode. 

Step 4 

ip flow {ingress | egress} 


Router(config-if)# ip flow ingress 

Enables NetFlow on the interface. 

. ingress—Captures traffic that is being received by the interface 

. egress—Captures traffic that is being transmitted by the interface 

Step 5 



Router(config-if)# exit 

(Optional) Exits interface configuration mode and enters global configuration mode. 


You need to use this command only if you want to enable NetFlow on another interface. 

Step 6 

Repeat Steps 3 through 5 to enable NetFlow on other interfaces. 

This step is optional. 

Step 7 



Router(config-if)# end Exits the current configuration mode and returns to privileged EXEC mod 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/netflow/configuration/guide/12_2sr/nf_12_2sr_boo k/cfg_nflow_data_expt.html 

Q19. Refer to the exhibit. 

Which statement is true? 

A. IS-IS has been enabled on R4 for IPv6, single-topology. 

B. IS-IS has been enabled on R4 for IPv6, multitopology. 

C. IS-IS has been enabled on R4 for IPv6, single-topology and multitopology. 

D. R4 advertises IPv6 prefixes, but it does not forward IPv6 traffic, because the protocol has not been enabled under router IS-IS. 



When working with IPv6 prefixes in IS-IS, you can configure IS-IS to be in a single topology for both IPv4 and IPv6 or to run different topologies for IPv4 and IPv6. By default, IS-IS works in single-topology mode when activating IPv4 and IPv6. This means that the IS-IS topology will be built based on IS Reachability TLVs. When the base topology is built, then IPv4 prefixes (IP Reachability TLV) and IPv6 prefixes (IPv6 Reachability TLV) are added to each node as leaves, without checking if there is IPv6 connectivity between nodes. 

Reference: https://blog.initialdraft.com/archives/3381/ 


Drag and drop the protocol on the left to the corresponding administrative distance on the right.