QUESTION 971
If MPLS label packets are swapped, what happens to the TTL value?
A. |
It is preserved. |
B. |
It is set to 255. |
C. |
It is decremented. |
D. |
It is set to zero. |
Correct Answer: C
QUESTION 972
Which two statements are correct about route redistribution? (Choose two)
A. |
Redistributing the entire BGP table from the Internet works well when using multiple OSPF areas. |
B. |
iBGP is used within the AS to carry eBGP attributes that otherwise would be lost if eBGP was redistributed into IGP. |
C. |
The unequal cost multipath load-balancing characteristic is lost when redistributing OSPF into EIGRP. |
D. |
IS-IS does not support Layer 2 routes leaking into a Layer 1 domain. |
E. |
Mutual redistribution at multiple points can create a routing loop. |
Correct Answer: BE
QUESTION 973
Refer to the exhibit. Why is interface loopback 0 of R4 missing in the BGP table of R2?
A. |
R2 is not configured as a route reflector client. |
B. |
The route is originating in the same cluster list. |
C. |
The route originated within the same AS. |
D. |
The next hop is not reachable form R2. |
Correct Answer: A
QUESTION 974
Which two statements about PIM snooping are true? (Choose two)
A. |
It floods join and prune messages on all router ports. |
B. |
It requires designated forwarder election messages. |
C. |
When PIM snooping is enabled, the switch allows all multicast packets for each IP multicast group to send multicast packets to multicast router. |
D. |
It requires RGMP to be enabled on the VLAN. |
E. |
It requires IGMP snooping to be enabled on the switch. |
F. |
The ip pirn snooping command is an interface-level command. |
Correct Answer: BE
QUESTION 975
Which encapsulation is used when deploying EIGRP OTP?
A. |
GRE |
B. |
LISP |
C. |
PPP |
D. |
dot1q |
E. |
MPLS |
F. |
ISL |
Correct Answer: B
QUESTION 976
What are two pieces of information that can be transmitted via Multiprotocol BGP? (Choose two)
A. |
MPLS VPN routes |
B. |
Level 1/Level 2 routers set the overload-bit. |
C. |
multicast sources |
D. |
IS-IS LSAs |
E. |
Level 2 routers set the attached bit. |
F. |
OSPF routes |
Correct Answer: AC
QUESTION 977
What is the function of the rendezvous point in PIM?
A. |
It acts as a shared root for a multicast tree. |
B. |
It is the main source of the multicast traffic. |
C. |
It redistributes the multicast configuration to its connected neighbors. |
D. |
It will redistribute the unicast routes to avoid an RPF failure. |
Correct Answer: A
QUESTION 978
Which option describes the purpose of the no ip next-hop-self eigrp configuration line in DMVPN deployment?
A. |
It allows the spoke routers to change the next hop value when sending EIGRP updates to the hub router. |
B. |
It enables EIGRP to dynamically assign the next hop value based on the EIGRP database. |
C. |
It preserves the original next hop value as learned by the spoke routers. |
D. |
It preserves the original next hop value as learned by the hub routers. |
E. |
It allows the spoke routers to change the next hop value when sending EIGRP updates to the spoke router. |
Correct Answer: C
QUESTION 979
Which three topologies are standardized by the Metro Ethernet Forum? (Choose three)
A. |
E-LAN |
B. |
VPWS |
C. |
E-Tree |
D. |
E-Line |
E. |
NPE |
F. |
PNNI |
Correct Answer: ACD
QUESTION 980
Which two conditions are required for tracking the interface IP routing state? (Choose two)
A. |
A VRF must be enabled on the interface. |
B. |
IP routing must be disabled on the interface. |
C. |
Cisco Express Forwarding must be disabled on the interface. |
D. |
The interface line protocol must be up. |
E. |
A known IP address must be configured on the interface. |
Correct Answer: DE
QUESTION 981
Which two configuration options are available for PIM snooping? (Choose two)
A. |
on a specific interface on the device |
B. |
under the SVI for the corresponding VLAN |
C. |
on a range of interfaces on the device |
D. |
under the VLAN in VLAN configuration mode |
E. |
globally on the device |
Correct Answer: BE
QUESTION 982
Refer to the exhibit. Between which routers is an LDP session established?
A. |
R1 and R3 |
B. |
R1, R2 and R3 |
C. |
R2 and R3 |
D. |
R1 and R2 |
Correct Answer: D
QUESTION 983
Which two methods do IPsec VTIs use to identify and transmit encrypted traffic through the tunnel? (Choose two)
A. |
object groups |
B. |
ACLs |
C. |
dynamic routing |
D. |
static routing |
E. |
NAT |
Correct Answer: CD
QUESTION 984
Which option describes the effect of the command ip route vrf DMZ 192.168.0.0 255.255.0.0 172.16.5.5 global?
A. |
It creates a static route in the global routing table for 192.168.0.0 255.255.0.0, and the next hop is in the VRF DMZ. |
B. |
It creates a static route in the global routing table for 192.168.0.0 255.255.0.0 and the next hop is in the global routing table. |
C. |
It creates a static default route in the VRF DMZ; and the next hop is in the global routing table. |
D. |
It creates a static route in the VRF DMZ for 192.168.0.0 255.255.0.0, and the next hop is in the VRF DMZ. |
E. |
It creates a static route in the VRF DMZ for 192.168.0.0 255.255.0.0, and the next hop is in the global routing table. |
Correct Answer: E
Free VCE & PDF File for Cisco 400-101 Real Exam
Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …