[PDF&VCE] 400-101 Latest Dumps Free Download From Lead2pass (251-275)

2016 October Cisco Official New Released 400-101 Dumps in Lead2pass.com!

100% Free Download! 100% Pass Guaranteed!

400-101 easy pass guide: Preparing for Cisco 400-101 exam is really a tough task to accomplish. However, Lead2pass delivers the most comprehensive braindumps, covering each and every aspect of 400-101 exam curriculum.

Following questions and answers are all new published by Cisco Official Exam Center: http://www.lead2pass.com/400-101.html

Refer to the exhibit. Which two statements about this configuration are true? (Choose two.)


A.    Spoke devices will be dynamically added to the NHRP mappings.
B.    The next-hop server address must be configured to on all spokes.
C.    The next-hop server address must be configured to on all spokes.
D.    R1 will create a static mapping for each spoke.

Answer: AC

Which two tunneling techniques determine the IPv4 destination address on a per-packet basis? (Choose two.)

A.    6to4 tunneling
B.    ISATAP tunneling
C.    manual tunneling
D.    GRE tunneling

Answer: AB

Which two services are used to transport Layer 2 frames across a packet-switched network? (Choose two.)

A.    Frame Relay
B.    ATM
C.    AToM
D.    L2TPv3

Answer: CD

Which two statements about the C-bit and PW type are true? (Choose two.)

A.    The C-bit is 1 byte and the PW type is 15 bytes.
B.    The PW type indicates the type of pseudowire.
C.    The C-bit is 3 bits and the PW type is 10 bits.
D.    The C-bit set to 1 indicates a control word is present.
E.    The PW type indicates the encryption type.

Answer: BD

Which statement describes the function of rekey messages?

A.    They prevent unencrypted traffic from passing through a group member before registration.
B.    They refresh IPsec SAs when the key is about to expire.
C.    They trigger a rekey from the server when configuring the rekey ACL.
D.    They authenticate traffic passing through a particular group member.

Answer: B

Which three statements about GET VPN are true? (Choose three.)

A.    It encrypts WAN traffic to increase data security and provide transport authentication.
B.    It provides direct communication between sites, which reduces latency and jitter.
C.    It can secure IP multicast, unicast, and broadcast group traffic.
D.    It uses a centralized key server for membership control.
E.    It enables the router to configure tunnels.
F.    It maintains full-mesh connectivity for IP networks.

Answer: ABD

Refer to the exhibit. If the traffic flowing from network to is unencrypted, which two actions must you take to enable encryption? (Choose two).

A.    Configure the transform-set on R2 to match the configuration on R1.
B.    Configure the crypto map on R2 to include the correct subnet.
C.    Configure the ISAKMP policy names to match on R1 and R2.
D.    Configure the crypto map names to match on R1 and R2.
E.    Configure the Diffie-Hellman keys used in the ISAKMP policies to be different on R1 and R2.

Answer: AB

Which service is disabled by the no service tcp-small-servers command?

A.    the finger service
B.    the Telnet service
C.    the Maintenance Operation Protocol service
D.    the chargen service

Answer: D

What is the ip dhcp snooping information option command used for?

A.    It displays information about the DHCP snooping table.
B.    It sends a syslog and an SNMP trap for a DHCP snooping violation.
C.    It enables the DHCP snooping host tracking feature.
D.    It enables DHCP option 82 data insertion.

Answer: D

Which two statements are true about unicast RPF? (Choose two.)

A.    Unicast RPF requires CEF to be enabled.
B.    Unicast RPF strict mode works better with multihomed networks.
C.    Unicast RPF strict mode supports symmetric paths.
D.    Unicast RPF strict mode supports asymmetric paths.
E.    CEF is optional with Unicast RPF, but when CEF is enabled it provides better performance.

Answer: AC

Under Cisco IOS Software, which two features are supported in RADIUS Change of Authorization requests? (Choose two.)

A.    session identification
B.    session reauthentication
C.    session termination
D.    host termination

Answer: AC

In a PfR environment, which two statements best describe the difference between active mode monitoring and fast mode monitoring? (Choose two.)

A.    Active mode monitoring can monitor and measure actual traffic via NetFlow data collection.
B.    Fast mode monitoring can measure bursty traffic better than active mode.
C.    Active mode monitoring uses IP SLA probes for the purpose of obtaining performance characteristics
of the current WAN exit link.
D.    Fast mode monitoring uses IP SLA probes via all valid exits continuously to quickly determine an
alternate exit link.

Answer: CD

Refer to the exhibit. Which two statements are true regarding prefix (Choose two.)

A.    The prefix is in policy, and Cisco PfR rerouted the traffic via Et0/1 because of an OOP event.
B.    Cisco PfR is monitoring the prefix via passive NetFlow mode only.
C.    Cisco PfR is monitoring the prefix via active, fast, or active throughput IP SLA probe mode only.
D.    The prefix is in policy, and Cisco PfR did not reroute the traffic via Et0/1 because the traffic
was previously in policy.
E.    Cisco PfR is monitoring the prefix via mode monitor, which provides both NetFlow and IP SLA measurements.

Answer: DE

In the DiffServ model, which class represents the lowest priority with the highest drop probability?

A.    AF11
B.    AF13
C.    AF41
D.    AF43

Answer: B

Which two hashing algorithms can be used when configuring SNMPv3? (Choose two.)

A.    MD5
B.    SHA-1
C.    Blowfish
D.    DES
E.    AES
F.    SSL

Answer: AB

Which two statements about the default router settings for SSH connections are true? (Choose two.)

A.    The default timeout value for the SSH negotiation phase is 120 seconds.
B.    Data is exchanged in clear text by default unless AAA authentication is enabled on the console.
C.    The default number of authentication retries is 3.
D.    SSH is enabled by default when you configure the username command.

Answer: AC

Refer to the exhibit. Which statement about the R1 configuration is true?

A.    It supports the service timestamps log uptime command to display time stamps.
B.    The logging buffer command was used to increase the default of the buffer.
C.    The logging of warning messages is disabled.
D.    Log message sequence numbering is disabled.

Answer: D

Which two statements about class maps are true? (Choose two.)

A.    As many as eight DSCP values can be included in a match dscp statement.
B.    The default parameter on a class map with more than one match command is match-any.
C.    The match class command can nest a class map within another class map.
D.    A policy map can be used to designate a protocol within a class map.

Answer: AC

Refer to the exhibit. Which statement about configuring the switch to manage traffic is true?

A.    The switchport priority extend cos command on interface FastEthernet0/0 prevents traffic to and
from the PC from taking advantage of the high-priority data queue that is assigned to the IP phone.
B.    The switchport priority extend cos command on interface FastEthernet0/0 enables traffic to and
from the PC to use the high priority data queue that is assigned to the IP phone.
C.    When the switch is configured to trust the CoS label of incoming traffic, the trusted boundary feature
is disabled automatically.
D.    The mls qos cos override command on interface FastEthernet0/0 configures the port to trust the
CoS label of traffic to and from the PC.

Answer: A

Which IP SLA operation type is enhanced by the use of the IP SLAs Responder?

A.    DNS
B.    HTTP
C.    ICMP Echo
D.    UDP Echo

Answer: D

Refer to the exhibit. Router 1 and Router 2 use HSRP to provide first hop redundancy for hosts on the network.
Which feature can provide additional failover coverage for the PC?

A.    Cisco Express Forwarding
B.    NetFlow
C.    Accounting
D.    Enhanced Object Tracking

Answer: D

Which neighbor-discovery message type is used to verify connectivity to a neighbor when the link-layer address of the neighbor is known?

A.    neighbor solicitation
B.    neighbor advertisement
C.    router advertisement
D.    router solicitation

Answer: A

Refer to the exhibit. Which two possible network conditions can you infer from this configuration? (Choose two.)

A.    The authentication parameters on R1 and R2 are mismatched.
B.    R1 is using the default NTP source configuration.
C.    R1 and R2 have established an NTP session.
D.    R2 is configured as the NTP master with a stratum of 7.

Answer: AB

Which three message types are used for prefix delegation in DHCPv6? (Choose three.)

A.    DHCP Discover
B.    Renew
C.    Solicit
D.    DHCP Offer
E.    Advertise
F.    DHCP Ack

Answer: BCE

Which two statements about static NAT are true? (Choose two.)

A.    An outside local address maps to the same outside global IP address.
B.    An inside local address maps to a different inside global IP address.
C.    An outside local address maps to a different outside global IP address.
D.    An inside local address maps to the same inside global IP address.

Answer: AD

Lead2pass provides guarantee of Cisco 400-101 exam because Lead2pass is an authenticated IT certifications site. The 400-101 dump is updated with regular basis and the answers are rechecked of every exam. Good luck in your exam.

400-101 new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDU2RjeUlHTTZXb1U

2016 Cisco 400-101 exam dumps (All 1219 Q&As) from Lead2pass:

http://www.lead2pass.com/400-101.html [100% Exam Pass Guaranteed]

Why Choose Lead2pass?

If you want to pass the exam successfully in first attempt you have to choose the best IT study material provider, in my opinion, Lead2pass is one of the best way to prepare for the exam.

Lead2pass Testking Pass4sure Actualtests Others
$99.99 $124.99 $125.99 $189 $29.99-$49.99
Real Questions
Error Correction
Printable PDF
Premium VCE
VCE Simulator
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back