[PDF&VCE] 400-101 Latest Dumps Free Download From Lead2pass (526-550)
2016 October Cisco Official New Released 400-101 Dumps in Lead2pass.com!
100% Free Download! 100% Pass Guaranteed!
Are you worrying about the 400-101 exam? Lead2pass provides the latest 400-101 braindumps and guarantees you passing 400-101 exam beyond any doubt.
Following questions and answers are all new published by Cisco Official Exam Center: http://www.lead2pass.com/400-101.html
Drag and Drop Question
Drag and drop the DSCP PHB on the left to the corresponding binary representation on the right.
A. Cisco Express Forwarding tables contain reachability information and adjacency tables contain forwarding information.
B. Cisco Express Forwarding tables contain forwarding information and adjacency tables contain reachability information.
C. Changing MAC header rewrite strings requires cache validation.
D. Adjacency tables and Cisco Express Forwarding tables can be built separately.
E. Adjacency tables and Cisco Express Forwarding tables require packet process-switching.
Which TCP feature allows a client to request a specific packet that was lost?
A. flow control
B. sliding window
C. fast recovery
D. selective acknowledgment
Which two solutions can reduce UDP latency? (Choose two.)
A. fast retransmission
B. fast recovery
C. fast start
D. low-latency queuing
E. IP service level agreements
F. congestion-avoidance algorithm
You are configuring Wireshark on a Cisco Catalyst 4500E Switch with a Supervisor 8. Which three actions can you take to prevent the capture from overloading the CPU? (Choose three.)
A. Attach the specific ports that are part of the data path.
B. Use an in-line filter.
C. Use an appropriate ACL.
D. Add memory to the Supervisor.
E. Reconfigure the buffers to accommodate the additional traffic.
F. Configure a policy map, class map, and an access list to express the match conditions.
Which three statements about VTP version 3 are true? (Choose three.)
A. It supports other databases in addition to VLAN.
B. It supports VLANs up to 4095.
C. It supports the synchronization of switch configuration templates between switches in the domain.
D. It supports the transfer of information about private VLAN structures.
E. It supports the transfer of PVST+ configuration information.
F. It supports RSTP.
In an STP domain, which two statements are true for a nonroot switch, when it receives a configuration BPDU from the root bridge with the TC bit set? (Choose two.)
A. It sets the MAC table aging time to max_age + forward_delay time.
B. It sets the MAC table aging time to forward_delay time.
C. It recalculates the STP topology upon receiving topology change notification from the root switch.
D. It receives the topology change BPDU on both forwarding and blocking ports.
Which two statements about RSTP and MSTP BPDUs are true? (Choose two.)
A. MSTP switches can detect boundary ports when they receive RSTP version 2 BPDUs.
B. MSTP switches can detect boundary ports when they receive RSTP version 1 BPDUs.
C. RSTP switches can process MSTP version 3 BPDUs.
D. When all boundary switches are running RSTP, MST sends only version 0 configuration BPDUs.
Which three options are sources from which a SPAN session can copy traffic? (Choose three.)
E. primary IP addresses
F. secondary IP addresses
Which three capabilities are provided by MLD snooping? (Choose three.)
A. dynamic port learning
B. IPv6 multicast router discovery
C. user-configured ports age out automatically
D. a 5-minute aging timer
E. flooding control packets to the egress VLAN
F. a 60-second aging timer
A. The PPP multilink protocol header is omitted on delay-sensitive packets.
B. The maximum number of fragments is 1.
C. Small real-time packets are multilink-encapsulated.
D. A transmit queue is provided for smaller packets.
Which two statements are characteristics of Ethernet private LAN circuits? (Choose two.)
A. They support communication between two or more customer endpoints.
B. They utilize more than one bridge domain.
C. They support point-to-multipoint EVC.
D. They support multipoint-to-multipoint EVC.
Which two statements about Inverse ARP are true? (Choose two.)
A. It uses the same operation code as ARP.
B. It uses the same packet format as ARP.
C. It uses ARP stuffing.
D. It supports static mapping.
E. It translates Layer 2 addresses to Layer 3 addresses.
F. It translates Layer 3 addresses to Layer 2 addresses.
Refer to the exhibit. R3 is failing to join the multicast group 126.96.36.199 that is sourcing from R1. Which two actions can you take to allow multicast traffic to flow correctly? (Choose two.)
A. Remove the static multicast route on R1.
B. Configure OSPF on R1 and R3 to include the tunnel interfaces.
C. Add an additional static multicast route on R2 for multicast group 188.8.131.52 toward R3.
D. Replace the static multicast route on R1 to send traffic toward R2.
E. Remove the static unicast route on R1.
F. Add an additional static unicast route on R2 toward the loopback interface of R3.
Which two modes of operation does BFD support? (Choose two.)
A. synchronous mode
B. asynchronous mode
C. demand mode
D. echo mode
E. aggressive mode
F. passive mode
Which two loop-prevention mechanisms are implemented in BGP? (Choose two.)
A. A route with its own AS in the AS_PATH is dropped automatically if the route reenters its own AS.
B. A route with its own cluster ID in the CLUSTER_LIST is dropped automatically when the route reenters its own AS.
C. The command bgp allowas-in enables a route with its own AS_PATH to be dropped when it reenters its own AS.
D. The command bgp bestpath as-path ignore enables the strict checking of AS_PATH so that they drop routes with their own AS in the AS_PATH.
E. The command bgp bestpath med missing-as-worst assigns the smallest possible MED, which directly prevents a loop.
A. Set the RIP authentication mode to text.
B. Set the RIP authentication mode to MD5.
C. Configure the password encryption for the key.
D. Set the password encryption to AES.
Which three routing protocols utilize TLVs? (Choose three.)
Which two statements about the command distance bgp 90 60 120 are true? (Choose two.)
A. Implementing the command is a Cisco best practice.
B. The external distance it sets is preferred over the internal distance.
C. The internal distance it sets is preferred over the external distance.
D. The local distance it sets may conflict with the EIGRP administrative distance.
E. The internal distance it sets may conflict with the EIGRP administrative distance.
F. The local distance it sets may conflict with the RIP administrative distance.
A. Configure the vrf-lite capability under the OSPF address families.
B. Correct the route descriptors.
C. Correct the OSPF router-ids.
D. Configure the control plane with a larger memory allocation to allow the device to appear in the routing table.
A. Devices in OSPF area 15 can reach the summary route 192.168.0.0/16 and its more specific subnets.
B. Devices in OSPF area 15 can reach only the more specific routes of 192.168.0.0/16.
C. Devices in OSPF area 0 can reach the summary route 192.168.0.0/16 and its more specific subnets.
D. Devices in OSPF area 0 can reach only the summary route of 192.168.0.0/16.
Which two technologies are supported by EIGRP? (Choose two.)
A. clear-text authentication
B. MD5 authentication
C. stub routing
D. multiple areas
How does having an EIGRP feasible successor speed up convergence?
A. EIGRP sends queries only if there is a feasible successor, which decreases the number of routers that are involved in convergence.
B. EIGRP sends queries only if there is not a feasible successor, which causes less control traffic to compete with data.
C. EIGRP immediately installs the loop-free alternative path in the RIB.
D. EIGRP preinstalls the feasible successor in the RIB in all cases, which causes traffic to switch more quickly.
Which two options are ways in which an OSPFv3 router handles hello packets with a clear address-family bit? (Choose two.)
A. IPv4 unicast packets are discarded.
B. IPv6 unicast packets are discarded.
C. IPv4 unicast packets are forwarded.
D. IPv6 unicast packets are forwarded.
Which two statements about OSPF route types are true? (Choose two.)
A. The cost of an external type 2 route is the sum of the external and internal costs.
B. The cost of an external type 2 route is the same as the external cost.
C. Intra-area routes originate outside of their area.
D. Inter-area routes originate inside their area.
E. The cost of an external type 1 route is the same as the internal cost.
F. For routes to the same destination, external type 1 routes are preferred over external type 2 routes.
Lead2pass offers the latest 400-101 PDF and VCE dumps with new version VCE player for free download, and the new 400-101 dump ensures your exam 100% pass.
400-101 new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDU2RjeUlHTTZXb1U
2016 Cisco 400-101 exam dumps (All 1219 Q&As) from Lead2pass:
http://www.lead2pass.com/400-101.html [100% Exam Pass Guaranteed]
Why Choose Lead2pass?
If you want to pass the exam successfully in first attempt you have to choose the best IT study material provider, in my opinion, Lead2pass is one of the best way to prepare for the exam.
|One Time Purchase||✔||✖||✖||✖||✖|
|100% Pass Guarantee||✔||✖||✖||✖||✖|
|100% Money Back||✔||✖||✖||✖||✖|