[Free] 2019(Nov) EnsurePass Cisco 400-101 Dumps with VCE and PDF 51-60

By | November 2, 2019

Get Full Version of the Exam

Question No.51

Which three steps are required to enable SSH access on a Cisco routers? (Choose three.)

  1. generating an RSA or DSA cryptographic key

  2. configuring the version of SSH

  3. configuring a domain name

  4. configuring VTY lines for use with SSH

  5. configuring the port for SSH to listen for connections

  6. generating an AES or SHA cryptographic key

Correct Answer: ACD


Here are the steps:1. Configure a hostname for the router using these commands. yourname#configure terminalEnter configuration commands, one per line. End with CNTL/Z. yourname (config)#hostname LabRouter


  1. Configure a domain name with the ip domain-name command followed by whatever you would like your domain name to be. I used CiscoLab.com.

    LabRouter(config)#ip domain-name CiscoLab.com

  2. We generate a certificate that will be used to encrypt the SSH packets using the crypto key generate rsa command.

    Take note of the message that is displayed right after we enter this command. quot;The name for the keys will be. LabRouter.CiscoLab.comquot; it combines the hostname of the router along with the domain name we configured to get the name of the encryption key generated; this is why it was important for us to, first of all, configure a hostname then a domain name before we generated the keys.

    Notice also that it asks us to choose a size of modulus for the key we#39;re about to generate. The higher the modulus, the stronger the encryption of the key. For our example, we#39;ll use a modulus of 1024.


  3. Now that we#39;ve generated the key, our next step would be to configure our vty lines for SSH access and specify which database we are going to use to provide authentication to the device. The local database on the router will do just fine for this example.

    LabRouter(config)#line vty 0 4 LabRouter(config-line)#login local LabRouter(config-line)#transport input ssh

  4. You will need to create an account on the local router#39;s database to be used for authenticating to the device. This can be accomplished with these commands.

LabRouter(config)#username XXXX privilege 15 secret XXXX

Reference: http://blog.pluralsight.com/configure-secure-shell-ssh-on-cisco-router

Question No.52

Refer to the exhibit. Which two statements about how the configuration processes Telnet traffic are true? (Choose two.)


  1. Telnet traffic from to is dropped.

  2. All Telnet traffic is dropped.

  3. Telnet traffic from to is permitted.

  4. Telnet traffic from to is permitted.

  5. Telnet traffic is permitted to all IP addresses.

Correct Answer: AC


The ACL applied to the COPP policy matches only telnet traffic from to, all other telnet traffic is not matched and therefore not used in the COPP policy, which means this traffic will be handled normally (accepted). For telnet traffic from to, the COPP policy has defined this traffic as an exceed, and dropped.

Question No.53

Refer to the exhibit. Service provider SP 1 is running the MPLS-VPN service. The MPLS core network has MP- BGP configured with RR-1 as route reflector. What will be the effect on traffic between PE1 and PE2 if router P1 goes down?


  1. No effect, because all traffic between PE1 and PE2 will be rerouted through P2.

  2. No effect, because P1 was not the only P router in the forwarding path of traffic.

  3. No effect, because RR-1 will find an alternative path for MP-BGP sessions to PE-1 and PE-2.

  4. All traffic will be lost because RR-1 will lose the MP-BGP sessions to PE-1 and PE-2.

Correct Answer: D


If the connection to the route reflector goes down, then routes from PE-1 will not get advertised to PE2, and vice versa. Route reflectors are critical in an MPLS VPN such as the one shown, which is why it is a best practice to have multiple route reflectors in this kind of network.

Question No.54

Refer to the exhibit. Router A and router B are physically connected over an Ethernet interface, and ISIS is configured as shown. Which option explains why the ISIS neighborship is not getting formed between router A and router B?


  1. same area ID

  2. same N selector

  3. same domain ID

  4. same system ID

Correct Answer: D


With IS-IS, the LSP identifier is derived from the system ID (along with the pseudonode ID and LSP number). Each IS is usually configured with one NET and in one area; each system ID within an area must be unique.

The big difference between NSAP style addressing and IP style addressing is that, in general, there will be a single NSAP address for the entire router, whereas with IP there will be one IP address per interface. All ISs and ESs in a routing domain must have system IDs of the same length. All routers in an area must have the same area address. All Level 2 routers must have a unique system ID domain-wide, and all Level 1 routers must have a unique system ID area-wide. Reference: http://www.cisco.com/en/US/products/ps6599/products_white_paper09186a00800a3e6f.shtml

Question No.55

Which two statements are true about VPLS? (Choose two.)

  1. It can work over any transport that can forward IP packets.

  2. It provides integrated mechanisms to maintain First Hop Resiliency Protocols such as HSRP, VRRP, or GLBP.

  3. It includes automatic detection of multihoming.

  4. It relies on flooding to propagate MAC address reachability information.

  5. It can carry a single VLAN per VPLS instance.

Correct Answer: DE


VPLS relies on flooding to propagate MAC address reachability information. Therefore, flooding cannot be prevented.

VPLS can carry a single VLAN per VPLS instance. To multiplex multiple VLANs on a single instance, VPLS uses IEEE QinQ.

Reference: http://www.cisco.com/c/en/us/products/collateral/switches/nexus-7000-series- switches/white_paper_c11-574984.html

Question No.56

Refer to the exhibit. Which statement describes the effect on the network if FastEthernet0/1 goes down temporarily?


  1. FastEthernet0/2 forwards traffic only until FastEthernet0/1 comes back up.

  2. FastEthernet0/2 stops forwarding traffic until FastEthernet0/1 comes back up.

  3. FastEthernet0/2 forwards traffic indefinitely.

  4. FastEthernet0/1 goes into standby.

Correct Answer: C


Use the switchport backup interface interface configuration command on a Layer 2 interface to configure Flex Links, a pair of interfaces that provide backup to each other. Use the no form of this command to remove the Flex Links configuration.

With Flex Links configured, one link acts as the primary interface and forwards traffic, while the other interface is in standby mode, ready to begin forwarding traffic if the primary link shuts down. The interface being configured is referred to as the active link; the specified interface is identified as the backup link. The feature provides an alternative to the Spanning Tree Protocol (STP), allowing users to turn off STP and still retain basic link redundancy.

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12- 2_53_se/command/reference/2960ComRef/cli3.html#wp3269214

Question No.57

Which three statements about the designated router election in IS-IS are true? (Choose three.)

  1. If the IS-IS DR fails, a new DR is elected.

  2. The IS-IS DR will preempt. If a new router with better priority is added, it just becomes active in the network.

  3. If there is a tie in DR priority, the router with a higher IP address wins.

  4. If there is a tie in DR priority, the router with a higher MAC address wins.

  5. If the DR fails, the BDR is promoted as the DR.

  6. The DR is optional in a point-to-point network.

Correct Answer: ABD


DR/DIS election highest priority (0-127) highest mac address

Setting priority to 0 doesn#39;t disable DIS election; use point-to-point to disable it. There can be separate DRs for L1 and L2 adjacencies.

There is no backup DR. If the primary DR fails, a new DR is elected. DR preemption is enabled by default.

Reference: http://ccie-in-2-months.blogspot.com/2013/12/is-is-hints.html

Question No.58

Refer to the exhibit. Routers R1, R2, and R3 are configured as shown, and traffic from R2 fails to reach Which action can you take to correct the problem?


  1. Correct the static route on R1.

  2. Correct the default route on R2.

  3. Edit the EIGRP configuration of R3 to enable auto-summary.

  4. Correct the network statement for on R3.

Correct Answer: A


On R1 we see there is a wrongly configured static route: ip route It should be ip route

Question No.59

Refer to the exhibit. Which action will solve the error state of this interface when connecting a host behind a Cisco IP phone?


  1. Configure dot1x-port control auto on this interface

  2. Enable errdisable recovery for security violation errors

  3. Enable port security on this interface

  4. Configure multidomain authentication on this interface

Correct Answer: D


In single-host mode, a security violation is triggered when more than one device are detected on the data vlan. In multidomain authentication mode, a security violation is triggered when more than one device are detected on the data or voice VLAN. Here we see that single host mode is being used, not multidomain mode.

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12- 2/50sg/configuration/guide/Wrapper-46SG/dot1x.html#wp1309041

Question No.60

What is the goal of Unicast Reverse Path Forwarding?

  1. to verify the reachability of the destination address in forwarded packets

  2. to help control network congestion

  3. to verify the reachability of the destination address in multicast packets

  4. to verify the reachability of the source address in forwarded packets

Correct Answer: D


Network administrators can use Unicast Reverse Path Forwarding (Unicast RPF) to help limit the malicious traffic on an enterprise network. This security feature works by enabling a router to verify the reachability of the source address in packets being forwarded. This capability can limit the appearance of spoofed addresses on a network. If the source IP address is not valid, the packet is discarded.

Reference: http://www.cisco.com/web/about/security/intelligence/unicast-rpf.html

Get Full Version of the Exam
400-101 Dumps
400-101 VCE and PDF

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.