Exact of ccie 400 101 dumps exam answers materials and dump for Cisco certification for IT specialist, Real Success Guaranteed with Updated 400 101 vce pdf dumps vce Materials. 100% PASS CCIE Routing and Switching (v5.0) exam Today!

Q401. Which circumstance can cause TCP starvation and UDP dominance to occur? 

A. Too few queues are available. 

B. UDP is comprised of smaller packets than TCP. 

C. Retransmitted TCP packets are on the network. 

D. UDP and TCP data are assigned to the same service-provider class. 

Answer:


Q402. Which three roles does a key server perform when used with GETVPN? (Choose three.) 

A. It authenticates group members. 

B. It manages security policies. 

C. It creates group keys. 

D. It distributes multicast replication policies. 

E. It distributes multicast replication keys. 

F. It configures and routes the GDOI protocol. 

Answer: A,B,C 

Explanation: 

Key server is responsible for maintaining security policies, authenticating the Group Members and providing the session key for encrypting traffic. KS authenticates the individual GMs at the time of registration. Only after successful registration the GMs can participate in group SA. 

Reference: http://www.cisco.com/c/en/us/products/collateral/security/group-encrypted-transport-vpn/deployment_guide_c07_554713.html 


Q403. DRAG DROP 

Drag and drop each EIGRP element on the left to the corresponding definition on the right. 

Answer: 


Q404. Refer to the exhibit. 

Which two route types are advertised by a router with this configuration? (Choose two.) 

A. connected 

B. external 

C. summary 

D. static 

E. redistributed 

Answer: A,C 


Q405. What is the VLAN ID range of VLANs that are eligible for pruning? 

A. 2 through 1001 

B. 1 through 1005 

C. 1 through 4096 

D. 2 through 1005 

Answer:


Q406. In IPv6 Path MTU Discovery, which ICMP message is sent by an intermediary router that requires a smaller MTU? 

A. Time Exceeded, with code 1 (fragment reassembly time exceeded) 

B. Packet Too Big 

C. Destination Unreachable, with code 4 (the datagram is too big) 

D. Multicast Termination Router 

Answer:


Q407. Refer to the exhibit. 

Which two statements about the EEM applet configuration are true? (Choose two.) 

A. The EEM applet runs before the CLI command is executed. 

B. The EEM applet runs after the CLI command is executed. 

C. The EEM applet requires a case-insensitive response. 

D. The running configuration is displayed only if the letter Y is entered at the CLI. 

Answer: A,D 

Explanation: 

sync Indicates whether the policy should be executed synchronously before the CLI command executes. 

. If the yes keyword is specified, the policy will run synchronously with the CLI command. 

. If the no keyword is specified, the policy will run asynchronously with the CLI command. 

nocase 

(Optional) Specifies case insensitive comparison. 

Here we see that the sync knob was enabled so A is correct. However, C is not correct as the nocase argument was not used, so the applet is configured to display the config only if a capital Y is issued. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/eem/command/eem-cr-book/eem-cr-a2.html 


Q408. Refer to the exhibit. 

NHRP registration is failing; what might be the problem? 

A. invalid IP addressing 

B. fragmentation 

C. incorrect NHRP mapping 

D. incorrect NHRP authentication 

Answer:

Explanation: 

Configuring an authentication string ensures that only routers configured with the same string can communicate using NHRP. Therefore, if the authentication scheme is to be used, the same string must be configured in all devices configured for NHRP on a fabric 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_4/ip_addr/configuration/guide/hadnhrp.html#w p1055432 


Q409. Which two options are differences between TACACS+ and RADIUS using AAA? (Choose two.) 

A. Only TACACS+ limits the protocols that are supported. 

B. Only RADIUS combines accounting and authentication. 

C. Only TACACS+ uses TCP. 

D. Only RADIUS combines authorization and accounting. 

E. Only RADIUS encrypts the password in packets from the client to the server. But leaves the body of the message unencrypted. 

Answer: C,E 


Q410. A packet capture log indicates that several router solicitation messages were sent from a local host on the IPv6 segment. What is the expected acknowledgment and its usage? 

A. Router acknowledgment messages will be forwarded upstream, where the DHCP server will allocate addresses to the local host. 

B. Routers on the IPv6 segment will respond with an advertisement that provides an external path from the local subnet, as well as certain data, such as prefix discovery. 

C. Duplicate Address Detection will determine if any other local host is using the same IPv6 address for communication with the IPv6 routers on the segment. 

D. All local host traffic will be redirected to the router with the lowest ICMPv6 signature, which is statically defined by the network administrator. 

Answer: