[PDF and VCE] Free Share 400-101 PDF Exam Preparation Materials with CertBus Real Exam Questions
CertBus 2018 Latest Cisco 400-101 CCIE Exam VCE and PDF Dumps for Free Download!
☆ 400-101 CCIE Exam PDF and VCE Dumps : 1379QAs Instant Download: https://www.certgod.com/400-101.html [100% 400-101 Exam Pass Guaranteed or Money Refund!!]
☆ Free view online pdf on CertBus free test 400-101 PDF: https://www.certgod.com/online-pdf/400-101.pdf
☆ CertBus 2018 Latest 400-101 CCIE exam Question PDF Free Download from Google Drive Share: https://drive.google.com/file/d/0B_3QX8HGRR1mdEpkTFZvSDJDc2c/view?usp=sharing
Following 400-101 1379QAs are all new published by Cisco Official Exam Center
We promise that you should not worry about Sep 17,2018 Latest 400-101 exam questions exam at all. We, CertBus, are here to provide guidance to help you pass the CCIE Hotest 400-101 QAs CCIE Routing and Switching Written v5.0 exam and get the Cisco certification. CertBus offers the latest real Latest 400-101 vce dumps CCIE Routing and Switching Written v5.0 exam PDF and VCE dumps. All the CCIE Latest 400-101 exam questions exam questions and answers are the latest and cover every aspect of Newest 400-101 vce exam.
400-101 vce exams | 400-101 vce certification software, 400-101 download vce dumps. latest microsoft, cisco, comptia,oracle,ibm,sun,juniper,hp and all 400-101 certification dumps – CertBus. reliable 400-101 certification exams preparation – latest braindumps at CertBus. CertBus | 400-101 certification materials | videos | study guides.
We CertBus has our own expert team. They selected and published the latest 400-101 preparation materials from Cisco Official Exam-Center: https://www.certgod.com/400-101.html
QUESTION NO:6
Why would a rogue host that is running a DHCP server on a campus LAN network present a
security risk?
A. It may allocate IP addresses from an unknown subnet to the users.
B. All multicast traffic can be sniffed by using the DHCP multicast capabilities.
C. The CPU utilization of the first hop router can be overloaded by exploiting DHCP relay open
ports.
D. A potential man-in-the-middle attack can be used against the clients.
Answer: D
Explanation:
QUESTION NO:8
Which statement is true about loop guard?
A. Loop guard only operates on interfaces that are considered point-to-point by the spanning tree.
B. Loop guard only operates on root ports.
C. Loop guard only operates on designated ports.
D. Loop guard only operates on edge ports.
Answer: A
Explanation:
Explanation
Understanding How Loop Guard Works
Unidirectional link failures may cause a root port or alternate port to become designated as root if
BPDUs are absent. Some software failures may introduce temporary loops in the network. Loop
guard checks if a root port or an alternate root port receives BPDUs. If the port is receiving
BPDUs, loop guard puts the port into an inconsistent state until it starts receiving BPDUs again.
Loop guard isolates the failure and lets spanning tree converge to a stable topology without the
failed link or bridge.
You can enable loop guard per port with the set spantree guard loop command.
Note When you are in MST mode, you can set all the ports on a switch with the set spantree
global-defaults loop-guard command.
When you enable loop guard, it is automatically applied to all of the active instances or VLANs to
which that port belongs. When you disable loop guard, it is disabled for the specified ports.
Disabling loop guard moves all loop-inconsistent ports to the listening state.
If you enable loop guard on a channel and the first link becomes unidirectional, loop guard blocks
the entire channel until the affected port is removed from the channel. Figure 8-6 shows loop
guard in a triangle switch configuration.
Figure 8-6 Triangle Switch Configuration with Loop Guard
Figure 8-6 illustrates the following configuration:
Switches A and B are distribution switches.
Switch C is an access switch.
Loop guard is enabled on ports 3/1 and 3/2 on Switches A, B, and C.
Use loop guard only in topologies where there are blocked ports. Topologies that have no blocked
ports, which are loop free, do not need to enable this feature. Enabling loop guard on a root switch
has no effect but provides protection when a root switch becomes a nonroot switch.
Follow these guidelines when using loop guard:
Do not enable loop guard on PortFast-enabled or dynamic VLAN ports.
Do not enable PortFast on loop guard-enabled ports.
Do not enable loop guard if root guard is enabled.
Do not enable loop guard on ports that are connected to a shared link.
Note: We recommend that you enable loop guard on root ports and alternate root ports on access
switches.
Loop guard interacts with other features as follows:
Loop guard does not affect the functionality of UplinkFast or BackboneFast.
Root guard forces a port to always be designated as the root port. Loop guard is effective only if
the port is a root port or an alternate port. Do not enable loop guard and root guard on a port at the
same time.
PortFast transitions a port into a forwarding state immediately when a link is established. Because
a PortFast-enabled port will not be a root port or alternate port, loop guard and PortFast cannot be
configured on the same port. Assigning dynamic VLAN membership for the port requires that the
port is PortFast enabled. Do not configure a loop guard-enabled port with dynamic VLAN
membership.
If your network has a type-inconsistent port or a PVID-inconsistent port, all BPDUs are dropped
until the misconfiguration is corrected. The port transitions out of the inconsistent state after the
message age expires. Loop guard ignores the message age expiration on type-inconsistent ports
and PVID-inconsistent ports. If the port is already blocked by loop guard, misconfigured BPDUs
that are received on the port make loop guard recover, but the port is moved into the type-
inconsistent state or PVID-inconsistent state.
In high-availability switch configurations, if a port is put into the blocked state by loop guard, it
remains blocked even after a switchover to the redundant supervisor engine. The newly activated
supervisor engine recovers the port only after receiving a BPDU on that port.
Loop guard uses the ports known to spanning tree. Loop guard can take advantage of logical ports
provided by the Port Aggregation Protocol (PAgP). However, to form a channel, all the physical
ports grouped in the channel must have compatible configurations. PAgP enforces uniform
configurations of root guard or loop guard on all the physical ports to form a channel.
These caveats apply to loop guard:
QUESTION NO:9
Which two are effects of connecting a network segment that is running 802.1D to a network
segment that is running 802.1w? (Choose two.)
A. The entire network switches to 802.1D and generates BPDUs to determine root bridge status. B.
A migration delay of three seconds occurs when the port that is connected to the 802.1D bridge
comes up.
C. The entire network reconverges and a unique root bridge for the 802.1D segment, and a root
bridge for the 802.1w segment, is chosen.
D. The first hop 802.1w switch that is connected to the 802.1D runs entirely in 802.1D compatibility
mode and converts the BPDUs to either 802.1D or 802.1w BPDUs to the 802.1D or 802.1w
segments of the network.
E. Classic 802.1D timers, such as forward delay and max-age, will only be used as a backup, and
will not be necessary if point-to-point links and edge ports are properly identified and set by the
administrator.
Answer: B,E
Explanation:
Each port maintains a variable that defines the protocol to run on the corresponding segment. A
migration delay timer of three seconds also starts when the port comes up. When this timer runs,
the current STP or RSTP mode associated to the port is locked. As soon as the migration delay
expires, the port adapts to the mode that corresponds to the next BPDU it receives. If the port
changes its mode of operation as a result of a BPDU received, the migration delay restarts.
802.1D works by the concept that the protocol had to wait for the network to converge before it
transitioned a port into the forwarding state. With Rapid Spanning Tree it does not have to rely on
any timers, the only variables that that it relies on is edge ports and link types.
Any uplink port that has an alternate port to the root can be directly placed into the forwarding
state (This is the Rapid convergence that you speak of “restored quickly when RSTP is already in
use?”). This is what happened when you disconnected the primary look; the port that was ALT,
moved to FWD immediately, but the switch also still needs to create a BDU with the TC bit set to
notify the rest of the network that a topology has occurred and all non-edge designated ports will
transition to BLK, LRN, and then FWD to ensure there are no loops in the rest of the network. This
is why if you have a host on a switchport, and you know for a fact that it is only one host, enable
portfast to configure the port as an edgeport so that it does not have to transition to all the STP
states.
Reference
http://www.cisco.com/en/US/tech/tk389/tk621/technologies_white_paper09186a0080094cfa.shtml
QUESTION NO:10
Which command is used to enable EtherChannel hashing for Layer 3 IP and Layer 4 port-based
CEF?
A. mpls ip cef
B. port-channel ip cef
C. mpls ip port-channel cef
D. port-channel load balance
E. mpls ip load-balance
F. ip cef EtherChannel channel-id XOR L4
G. ip cef connection exchange
Answer: D
Explanation:
QUESTION NO:12
Which two options are contained in a VTP subset advertisement? (Choose two.)
A. followers field
B. MD5 digest
C. VLAN information
D. sequence number
Answer: C,D
Explanation:
Subset Advertisements
When you add, delete, or change a VLAN in a Catalyst, the server Catalyst where the changes are
made increments the configuration revision and issues a summary advertisement. One or several
subset advertisements follow the summary advertisement. A subset advertisement contains a list
of VLAN information.
If there are several VLANs, more than one subset advertisement can be required in order to
advertise all the VLANs.
Subset Advertisement Packet Format
This formatted example shows that each VLAN information field contains information for a different
VLAN. It is ordered so that lowered-valued ISL VLAN IDs occur first:
Most of the fields in this packet are easy to understand. These are two clarifications:
Code
Latest 400-101 Dumps400-101 Practice Test400-101 Study Guide
QUESTION NO:13
Which two statements are true about traffic shaping? (Choose two.)
A. Out-of-profile packets are queued.
B. It causes TCP retransmits.
C. Marking/remarking is not supported.
D. It does not respond to BECN and ForeSight Messages.
E. It uses a single/two-bucket mechanism for metering.
Answer: A,C
Explanation:
QUESTION NO:15
Which three options are considered in the spanning-tree decision process? (Choose three.)
A. lowest root bridge ID
B. lowest path cost to root bridge
C. lowest sender bridge ID
D. highest port ID
E. highest root bridge ID
F. highest path cost to root bridge
Answer: A,B,C
Explanation:
Configuration bridge protocol data units (BPDUs) are sent between switches for each port.
Switches use s four step process to save a copy of the best BPDU seen on every port. When a
port receives a better BPDU, it stops sending them. If the BPDUs stop arriving for 20 seconds
(default), it begins sending them again.
Step 1 Lowest Root Bridge ID (BID)
Step 2 Lowest Path Cost to Root Bridge
Step 3 Lowest Sender BID
Step 4 Lowest Port ID
Reference
Cisco General Networking Theory Quick Reference Sheets
QUESTION NO:18
Refer to the exhibit.
Which statement is correct about the prefix 160.0.0.0/8?
A. The prefix has encountered a routing loop.
B. The prefix is an aggregate with an as-set.
C. The prefix has been aggregated twice, once in AS 100 and once in AS 200.
D. None of these statements is true.
Answer: B
Explanation:
QUESTION NO:22
Refer to the exhibit.
Which path is selected as best path?
A. path 1, because it is learned from IGP B.
path 1, because the metric is the lowest C.
path 2, because it is external
D. path 2, because it has the higher router ID
Answer: B
Explanation:
QUESTION NO:25
Refer to the exhibit.
After a link flap in the network, which two EIGRP neighbors will not be queried for alternative
paths? (Choose two.)
A. 192.168.1.1
B. 192.168.3.7
C. 192.168.3.8
D. 192.168.3.6
E. 192.168.2.1
F. 192.168.3.9
Answer: B,C
Explanation:
Explanation
Both 192.168.3.7 and 192.168.3.8 are in an EIGRP Stub area
The Enhanced Interior Gateway Routing Protocol (EIGRP) Stub Routing feature improves network
stability, reduces resource utilization, and simplifies stub router configuration.
Stub routing is commonly used in a hub and spoke network topology. In a hub and spoke network,
one or more end (stub) networks are connected to a remote router (the spoke) that is connected to
one or more distribution routers (the hub). The remote router is adjacent only to one or more
distribution routers. The only route for IP traffic to follow into the remote router is through a
distribution router. This type of configuration is commonly used in WAN topologies where the
distribution router is directly connected to a WAN. The distribution router can be connected to
many more remote routers. Often, the distribution router will be connected to 100 or more remote
routers. In a hub and spoke topology, the remote router must forward all nonlocal traffic to a
distribution router, so it becomes unnecessary for the remote router to hold a complete routing
table. Generally, the distribution router need not send anything more than a default route to the
remote router.
When using the EIGRP Stub Routing feature, you need to configure the distribution and remote
routers to use EIGRP, and to configure only the remote router as a stub. Only specified routes are
propagated from the remote (stub) router. The router responds to queries for summaries,
connected routes, redistributed static routes, external routes, and internal routes with the message
“inaccessible.” A router that is configured as a stub will send a special peer information packet to
all neighboring routers to report its status as a stub router. Any neighbor that receives a packet
informing it of the stub status will not query the stub router for any routes, and a router that has a
stub peer will not query that peer. The stub router will depend on the distribution router to send the
proper updates to all peers.
Reference
http://www.cisco.com/en/US/docs/ios/12_0s/feature/guide/eigrpstb.html#wp1021949
CertBus exam braindumps are pass guaranteed. We guarantee your pass for the 400-101 exam successfully with our Cisco materials. CertBus CCIE Routing and Switching Written v5.0 exam PDF and VCE are the latest and most accurate. We have the best Cisco in our team to make sure CertBus CCIE Routing and Switching Written v5.0 exam questions and answers are the most valid. CertBus exam CCIE Routing and Switching Written v5.0 exam dumps will help you to be the Cisco specialist, clear your 400-101 exam and get the final success.
400-101 Latest questions and answers on Google Drive(100% Free Download): https://drive.google.com/file/d/0B_3QX8HGRR1mdEpkTFZvSDJDc2c/view?usp=sharing
400-101 Cisco exam dumps (100% Pass Guaranteed) from CertBus: https://www.certgod.com/400-101.html [100% Exam Pass Guaranteed]
Why select/choose CertBus?
Millions of interested professionals can touch the destination of success in exams by certgod.com. products which would be available, affordable, updated and of really best quality to overcome the difficulties of any course outlines. Questions and Answers material is updated in highly outclass manner on regular basis and material is released periodically and is available in testing centers with whom we are maintaining our relationship to get latest material.