Download New Updated (Spring 2015) Cisco 400-101 Actual Tests 51-60

By | April 27, 2015

Ensurepass

 

QUESTION 51

Refer to the exhibit. R2 is mutually redistributing between EIGRP and BGP. Which configuration is necessary to enable R1 to see routes from R3?

 

clip_image001

 

A.

The R3 configuration must include ebgp-multihop to the neighbor statement for R2.

B.

The R2 BGP configuration must include bgp redistribute-internal.

C.

R1 must be configured with next-hop-self for the neighbor going to R2.

D.

The AS numbers configured on R1 and R2 must match.

 

Correc
t Answer:
B

 

 

QUESTION 52

What is the purpose of EIGRP summary leaking?

 

A.

to allow a summary to be advertised conditionally on specific criteria

B.

to allow a component of a summary to be advertised in addition to the summary

C.

to allow overlapping summaries to exist on a single interface

D.

to modify the metric of the summary based on which components of the summary are operational

 

Correct Answer: B

 

 

QUESTION 53

Refer to the exhibit. You have just created a new VRF on PE3. You have enabled debug ip bgp vpnv4 unicast updates on PE1, and you can see the route in the debug, but not in the BGP VPNv4 table. Which two statements are true? (Choose two.)

 

clip_image003

 

A.

VPNv4 is not configured between PE1 and PE3.

B.

address-family ipv4 vrf is not configured on PE3.

C.

After you configure route-target import 999:999 for a VRF on PE3, the route will be accepted.

D.

PE1 will reject the route due to automatic route filtering.

E.

After you configure route-target import 999:999 for a VRF on PE1, the route will be accepted.

 

Correct Answer: DE

 

 

QUESTION 54

Refer to the exhibit. NHRP registration is failing; what might be the problem?

 

clip_image005

 

A.

invalid IP addressing

B.

fragmentation

C.

incorrect NHRP mapping

D.

incorrect NHRP authentication

 

Correct Answer: D

 

 

QUESTION 55

In GETVPN, which key is used to secure the control plane?

 

A.

Traffic Encryption Key (TEK)

B.

content encryption key (CEK)

C.

message encryption key (MEK)

D.

Key Encryption Key (KEK).

 

Correct Answer: D

 

 

QUESTION 56

Which statement is true comparing L2TPv3 to EoMPLS?

 

A.

L2TPv3 requires OSPF routing, whereas EoMPLS does not.

B.

EoMPLS requires BGP routing, whereas L2TPv3 does not.

C.

L2TPv3 carries L2 frames inside MPLS tagged packets, whereas EoMPLS carries L2 frames inside IPv4 packets.

D.

L2TPv3 carries L2 frames inside IPv4 packets, whereas EoMPLS carries L2 frames inside MPLS packets.

 

Correct Answer: D

 

 

QUESTION 57

Which statement is true about VPLS?

 

A.

MPLS is not required for VPLS to work.

B.

VPLS carries packets as Layer 3 multicast.

C.

VPLS has been introduced to address some shortcomings of OTV.

D.

VPLS requires an MPLS network.

 

Correct Answer: D

 

 

QUESTION 58

According to RFC 4577, OSPF for BGP/MPLS IP VPNs, when must the down bit be set?

 

A.

when an OSPF route is distributed from the PE to the CE, for Type 3 LSAs

B.

when an OSPF route is distributed from the PE to the CE, for Type 5 LSAs

C.

when an OSPF route is distributed from the PE to the CE, for Type 3 and Type 5 LSAs

D.

when an OSPF route is distributed from the PE to the CE, for all types of LSAs

 

Correct Answer: C

 

 

 

 

 

 

QUESTION 59

Refer to the exhibit. Service provider SP 1 is running the MPLS-VPN service. The MPLS core network has MP- BGP configured with RR-1 as route reflector. What will be the effect on traffic between PE1 and PE2 if router P1 goes down?

 

clip_image007

 

A.

No effect, because all traffic between PE1 and PE2 will be rerouted through P2.

B.

No effect, because P1 was not the only P router in the forwarding path of traffic.

C.

No effect, because RR-1 will find an alternative path for MP-BGP sessions to PE-1 and PE-2.

D.

All traffic will be lost because RR-1 will lose the MP-BGP sessions to PE-1 and PE-2.

 

Correct Answer: D

 

 

QUESTION 60

Refer to the exhibit. What is a possible reason for the IPSEC tunnel not establishing?

 

clip_image008

 

A.

The peer is unreachable.

B.

The transform sets do not match.

C.

The proxy IDs are invalid.

D.

The access lists do not match.

Correct Answer: D

Free VCE & PDF File for Cisco 400-101 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …