Latest CertBus 400-101 Exam 400-101 Dumps 100% Free Download
CertBus 2017 Hottest Cisco 400-101 CCIE Exam VCE and PDF Dumps for Free Download!
☆ 400-101 CCIE Exam PDF and VCE Dumps : 828QAs Instant Download: https://www.certgod.com/400-101.html [100% 400-101 Exam Pass Guaranteed or Money Refund!!]
☆ Free view online pdf on CertBus free test 400-101 PDF: https://www.certgod.com/online-pdf/400-101.pdf
☆ CertBus 2017 Hottest 400-101 CCIE exam Question PDF Free Download from Google Drive Share: https://drive.google.com/file/d/0B_3QX8HGRR1mdEpkTFZvSDJDc2c/view?usp=sharing
Following 400-101 828QAs are all new published by Cisco Official Exam Center
One of my colleague recommend me that CertBus CCIE Newest 400-101 pdf dumps dumps are effective and helpful. Thank goodness I followed up with him and choose CertBus as my assistance on my CCIE Newest 400-101 free download CCIE Routing and Switching Written v5.0 certification exam! I passed my Cisco CCIE Latest 400-101 QAs exam very easily. I was lucky, all my questions in the exams were from my Cisco CCIE Nov 11,2017 Newest 400-101 vce dumps.
CertBus – the most professional provider of all 400-101 certifications. pass all the 400-101 exam easily. latest 400-101 exam dumps. get your certification easily- CertBus. CertBus – best way to guarantee your 400-101 certification and exam success! 400-101 certification training tips | resources for 400-101 exam study 400-101 certification application guide and 400-101 training.
We CertBus has our own expert team. They selected and published the latest 400-101 preparation materials from Cisco Official Exam-Center: https://www.certgod.com/400-101.html
QUESTION NO:7
Which statement is true about TCN propagation?
A. The originator of the TCN immediately floods this information through the network.
B. The TCN propagation is a two step process.
C. A TCN is generated and sent to the root bridge.
D. The root bridge must flood this information throughout the network.
Answer: C
Explanation:
Explanation
New Topology Change Mechanisms
When an 802.1D bridge detects a topology change, it uses a reliable mechanism to first notify the
root bridge.
This is shown in this diagram:
Once the root bridge is aware of a change in the topology of the network, it sets the TC flag on the
BPDUs it sends out, which are then relayed to all the bridges in the network. When a bridge
receives a BPDU with the TC flag bit set, it reduces its bridging-table aging time to forward delay
seconds. This ensures a relatively quick flush of stale information. Refer to Understanding
Spanning-Tree Protocol Topology Changes for more information on this process. This topology
change mechanism is deeply remodeled in RSTP. Both the detection of a topology change and its
propagation through the network evolve.
Topology Change Detection
In RSTP, only non-edge ports that move to the forwarding state cause a topology change. This
means that a loss of connectivity is not considered as a topology change any more, contrary to
802.1D (that is, a port that moves to blocking no longer generates a TC). When a RSTP bridge
detects a topology change, these occur:
It starts the TC While timer with a value equal to twice the hello-time for all its non-edge
designated ports and its root port, if necessary.
It flushes the MAC addresses associated with all these ports.
Note: As long as the TC While timer runs on a port, the BPDUs sent out of that port have the TC
bit set.
BPDUs are also sent on the root port while the timer is active.
Topology Change Propagation
When a bridge receives a BPDU with the TC bit set from a neighbor, these occur:
It clears the MAC addresses learned on all its ports, except the one that receives the topology
change.
It starts the TC While timer and sends BPDUs with TC set on all its designated ports and root port
(RSTP no longer uses the specific TCN BPDU, unless a legacy bridge needs to be notified).
This way, the TCN floods very quickly across the whole network. The TC propagation is now a one
step process. In fact, the initiator of the topology change floods this information throughout the
network, as opposed to 802.1D where only the root did. This mechanism is much faster than the
802.1D equivalent. There is no need to wait for the root bridge to be notified and then maintain the
topology change state for the whole network for seconds.
In just a few seconds, or a small multiple of hello-times, most of the entries in the CAM tables of
the entire network (VLAN) flush. This approach results in potentially more temporary flooding, but
on the other hand it clears potential stale information that prevents rapid connectivity restitution.
Reference
http://www.cisco.com/en/US/tech/tk389/tk621/technologies_white_paper09186a0080094cfa.shtml
QUESTION NO:13
Which two statements are true about traffic shaping? (Choose two.)
A. Out-of-profile packets are queued.
B. It causes TCP retransmits.
C. Marking/remarking is not supported.
D. It does not respond to BECN and ForeSight Messages.
E. It uses a single/two-bucket mechanism for metering.
Answer: A,C
Explanation:
QUESTION NO:14
Which three options are features of VTP version 3? (Choose three.)
A. VTPv3 supports 8K VLANs.
B. VTPv3 supports private VLAN mapping.
C. VTPv3 allows for domain discovery.
D. VTPv3 uses a primary server concept to avoid configuration revision issues.
E. VTPv3 is not compatible with VTPv1 or VTPv2.
F. VTPv3 has a hidden password option.
Answer: B,D,F
Explanation:
Key Benefits of VTP Version 3
Much work has gone into improving the usability of VTP version 3 in three major areas:
The new version of VTP offers better administrative control over which device is allowed to update
other devices’ view of the VLAN topology. The chance of unintended and disruptive changes is
significantly reduced, and availability is increased. The reduced risk of unintended changes will
ease the change process and help speed deployment.
Functionality for the VLAN environment has been significantly expanded. Two enhancements are
most beneficial for today’s networks:
QUESTION NO:15
Which three options are considered in the spanning-tree decision process? (Choose three.)
A. lowest root bridge ID
B. lowest path cost to root bridge
C. lowest sender bridge ID
D. highest port ID
E. highest root bridge ID
F. highest path cost to root bridge
Answer: A,B,C
Explanation:
Configuration bridge protocol data units (BPDUs) are sent between switches for each port.
Switches use s four step process to save a copy of the best BPDU seen on every port. When a
port receives a better BPDU, it stops sending them. If the BPDUs stop arriving for 20 seconds
(default), it begins sending them again.
Step 1 Lowest Root Bridge ID (BID)
Step 2 Lowest Path Cost to Root Bridge
Step 3 Lowest Sender BID
Step 4 Lowest Port ID
Reference
Cisco General Networking Theory Quick Reference Sheets
QUESTION NO:16
In 802.1s, how is the VLAN to instance mapping represented in the BPDU?
A. The VLAN to instance mapping is a normal 16-byte field in the MST BPDU.
B. The VLAN to instance mapping is a normal 12-byte field in the MST BPDU.
C. The VLAN to instance mapping is a 16-byte MD5 signature field in the MST BPDU.
D. The VLAN to instance mapping is a 12-byte MD5 signature field in the MST BPDU.
Answer: C
Explanation:
MST Configuration and MST Region
Each switch running MST in the network has a single MST configuration that consists of these
three attributes:
1. An alphanumeric configuration name (32 bytes)
2. A configuration revision number (two bytes)
3. A 4096-element table that associates each of the potential 4096 VLANs supported on the
chassis to a given instance.
In order to be part of a common MST region, a group of switches must share the same
configuration attributes.
It is up to the network administrator to properly propagate the configuration throughout the region.
Currently, this step is only possible by the means of the command line interface (CLI) or through
Simple Network
Management Protocol (SNMP). Other methods can be envisioned, as the IEEE specification does
not explicitly mention how to accomplish that step.
Note: If for any reason two switches differ on one or more configuration attribute, the switches are
part of different regions. For more information refer to the Region Boundary section of this
document.
Region Boundary
In order to ensure consistent VLAN-to-instance mapping, it is necessary for the protocol to be able
to exactly identify the boundaries of the regions. For that purpose, the characteristics of the region
are included in the BPDUs. The exact VLANs-to-instance mapping is not propagated in the BPDU,
because the switches only need to know whether they are in the same region as a neighbor.
Therefore, only a digest of the VLANs-toinstance mapping table is sent, along with the revision
number and the name. Once a switch receives a BPDU, the switch extracts the digest (a
numerical value derived from the VLAN-to-instance mapping table through a mathematical
function) and compares this digest with its own computed digest. If the digests differ, the port on
which the BPDU was received is at the boundary of a region.
In generic terms, a port is at the boundary of a region if the designated bridge on its segment is in
a different region or if it receives legacy 802.1d BPDUs. In this diagram, the port on B1 is at the
boundary of region A, whereas the ports on B2 and B3 are internal to region B:
MST Instances
According to the IEEE 802.1s specification, an MST bridge must be able to handle at least these
two instances:
One Internal Spanning Tree (IST)
One or more Multiple Spanning Tree Instance(s) (MSTIs)
The terminology continues to evolve, as 802.1s is actually in a pre-standard phase. It is likely
these names will change in the final release of 802.1s. The Cisco implementation supports 16
instances: one IST (instance 0) and 15 MSTIs.
show vtp status
Cisco switches “show vtp status” Field Descriptions has a MD5 digest field that is a 16-byte
checksum of the
VTP configuration as shown below
Router# show vtp status
VTP Version: 3 (capable)
Configuration Revision: 1
Maximum VLANs supported locally: 1005
Number of existing VLANs: 37
VTP Operating Mode: Server
VTP Domain Name: [smartports]
VTP Pruning Mode: Disabled
VTP V2 Mode: Enabled
VTP Traps Generation: Disabled
MD5 digest : 0x26 0xEE 0x0D 0x84 0x73 0x0E 0x1B 0x69
Configuration last modified by 172.20.52.19 at 7-25-08 14:33:43
Local updater ID is 172.20.52.19 on interface Gi5/2 (first layer3 interface fou)
VTP version running: 2
Reference
http://www.cisco.com/en/US/tech/tk389/tk621/technologies_white_paper09186a0080094cfc.shtml
http://www.cisco.com/en/US/docs/ios-xml/ios/lanswitch/command/lsw-cr-book.pdf
400-101 VCE Dumps400-101 Practice Test400-101 Braindumps
QUESTION NO:18
Refer to the exhibit.
Which statement is correct about the prefix 160.0.0.0/8?
A. The prefix has encountered a routing loop.
B. The prefix is an aggregate with an as-set.
C. The prefix has been aggregated twice, once in AS 100 and once in AS 200.
D. None of these statements is true.
Answer: B
Explanation:
QUESTION NO:19
Which two options does Cisco PfR use to control the entrance link selection with inbound
optimization? (Choose two.)
A. Prepend extra AS hops to the BGP prefix.
B. Advertise more specific BGP prefixes (longer mask).
C. Add (prepend) one or more communities to the prefix that is advertised by BGP.
D. Have BGP dampen the prefix.
Answer: A,C
Explanation: PfR Entrance Link Selection Control Techniques
The PfR BGP inbound optimization feature introduced the ability to influence inbound traffic. A
network advertises reachability of its inside prefixes to the Internet using eBGP advertisements to
its ISPs. If the same prefix is advertised to more than one ISP, then the network is multihoming.
PfR BGP inbound optimization works best with multihomed networks, but it can also be used with
a network that has multiple connections to the same ISP. To implement BGP inbound
optimization, PfR manipulates eBGP advertisements to influence the best entrance selection for
traffic bound for inside prefixes. The benefit of implementing the best entrance selection is limited
to a network that has more than one ISP connection.
To enforce an entrance link selection, PfR offers the following methods:
BGP Autonomous System Number Prepend When an entrance link goes out-of-policy (OOP) due
to delay, or in images prior to Cisco IOS Releases 15.2(1) T1 and 15.1(2)S, and PfR selects a
best entrance for an inside prefix, extra autonomous system hops are prepended one at a time (up
to a maximum of six) to the inside prefix BGP advertisement over the other entrances. In Cisco
IOS Releases 15.2(1)T1, 15.1(2)S, and later releases, when an entrance link goes out-of policy
(OOP) due to unreachable or loss reasons, and PfR selects a best entrance for an inside prefix,
six extra autonomous system hops are prepended immediately to the inside prefix BGP
advertisement over the other entrances. The extra autonomous system hops on the other
entrances increase the probability that the best entrance will be used for the inside prefix. When
the entrance link is OOP due to unreachable or loss reasons, six extra autonomous system hops
are added immediately to allow the software to quickly move the traffic away from the old entrance
link. This is the default method PfR uses to control an inside prefix, and no user configuration is
required.
BGP Autonomous System Number Community Prepend
When an entrance link goes out-of-policy (OOP) due to delay, or in images prior to Cisco IOS
Releases 15.2
(1)T1 and 15.1(2)S, and PfR selects a best entrance for an inside prefix, a BGP prepend
community is attached one at a time (up to a maximum of six) to the inside prefix BGP
advertisement from the network to another autonomous system such as an ISP. In Cisco IOS
Releases 15.2(1)T1, 15.1(2)S, and later releases, when an entrance link goes out-of-policy (OOP)
due to unreachable or loss reasons, and PfR selects a best entrance for an inside prefix, six BGP
prepend communities are attached to the inside prefix BGP advertisement. The BGP prepend
community will increase the number of autonomous system hops in the advertisement of the
inside prefix from the ISP to its peers. Autonomous system prepend BGP community is the
preferred method to be used for PfR BGP inbound optimization because there is no risk of the
local ISP filtering the extra autonomous system hops. There are some issues, for example, not all
ISPs support the BGP prepend community, ISP policies may ignore or modify the autonomous
system hops, and a transit ISP may filter the autonomous system path. If you use this method of
inbound optimization and a change is made to an autonomous system, you must issue an
outbound reconfiguration using the “clear ip bgp” command.
Reference
http://www.cisco.com/en/US/docs/ios-xml/ios/pfr/configuration/15-2s/pfr-bgp-inbound.html#GUID-
F8A59E241D59-
4924-827D-B23B43D9A8E0
http://www.cisco.com/en/US/products/ps8787/products_ios_protocol_option_home.html
QUESTION NO:23
What action will a BGP route reflector take when it receives a prefix marked with the community
attribute NO ADVERTISE from a client peer?
A. It will advertise the prefix to all other client peers and non-client peers.
B. It will not advertise the prefix to EBGP peers.
C. It will only advertise the prefix to all other IBGP peers.
D. It will not advertise the prefix to any peers.
Answer: D
Explanation:
QUESTION NO:26
Refer to the exhibit.
Why is AS 65333 in parentheses?
A. It is an external AS.
B. It is a confederation AS.
C. It is the AS of a route reflector.
D. It is our own AS.
E. A route map has been applied to this route.
F. The BGP next hop is unreachable.
Answer: B
Explanation:
QUESTION NO:27
Refer to the exhibit.
What triggered the first SPF recalculation?
A. changes in a router LSA, subnet LSA, and external LSA
B. changes in a router LSA, summary network LSA, and external LSA
C. changes in a router LSA, summary network LSA, and summary ASBR LSA
D. changes in a router LSA, summary ASBR LSA, and external LSA
Answer: B
Explanation:
OSPFv2
Is built around links, and any IP prefix change in an area will trigger a full SPF. It advertises IP
information in Router and Network LSAs. The routers thus, advertise both the IP prefix information
(or the connected subnet information) and topology information in the same LSAs. This implies
that if an IP address attached to an interface changes, OSPF routers would have to originate a
Router LSA or a Network LSA, which btw also carries the topology information. This would trigger
a full SPF on all routers in that area, since the same LSAs are flooded to convey topological
change information. This can be an issue with an access router or the one sitting at the edge,
since many stub links can change regularly.
Only changes in interarea, external and NSSA routes result in partial SPF calculation (since type
3, 4, 5 and 7 LSAs only advertise IP prefix information) and thus IS-IS
CertBus exam braindumps are pass guaranteed. We guarantee your pass for the 400-101 exam successfully with our Cisco materials. CertBus CCIE Routing and Switching Written v5.0 exam PDF and VCE are the latest and most accurate. We have the best Cisco in our team to make sure CertBus CCIE Routing and Switching Written v5.0 exam questions and answers are the most valid. CertBus exam CCIE Routing and Switching Written v5.0 exam dumps will help you to be the Cisco specialist, clear your 400-101 exam and get the final success.
400-101 Latest questions and answers on Google Drive(100% Free Download): https://drive.google.com/file/d/0B_3QX8HGRR1mdEpkTFZvSDJDc2c/view?usp=sharing
400-101 Cisco exam dumps (100% Pass Guaranteed) from CertBus: https://www.certgod.com/400-101.html [100% Exam Pass Guaranteed]
Why select/choose CertBus?
Millions of interested professionals can touch the destination of success in exams by certgod.com. products which would be available, affordable, updated and of really best quality to overcome the difficulties of any course outlines. Questions and Answers material is updated in highly outclass manner on regular basis and material is released periodically and is available in testing centers with whom we are maintaining our relationship to get latest material.