Cause all that matters here is passing the Cisco 400 101 ccie exam. Cause all that you need is a high score of passleader 400 101 CCIE Routing and Switching (v5.0) exam. The only one thing you need to do is downloading Testking passleader 400 101 exam study guides now. We will not let you down with our money-back guarantee.
Q291. Which two methods change the IP MTU value for an interface? (Choose two.)
A. Configure the default MTU.
B. Configure the IP system MTU.
C. Configure the interface MTU.
D. Configure the interface IP MTU.
An IOS device configured for IP+MPLS routing uses three different Maximum Transmission Unit (MTU) values: The hardware MTU configured with the mtu interface configuration command
. The IP MTU configured with the ip mtu interface configuration command
. The MPLS MTU configured with the mpls mtu interface configuration command
The hardware MTU specifies the maximum packet length the interface can support … or at least that's the theory behind it. In reality, longer packets can be sent (assuming the hardware interface chipset doesn't complain); therefore you can configure MPLS MTU to be larger than the interface MTU and still have a working network. Oversized packets might not be received correctly if the interface uses fixed-length buffers; platforms with scatter/gather architecture (also called particle buffers) usually survive incoming oversized packets.
IP MTU is used to determine whether am IP packet forwarded through an interface has to be fragmented. It has to be lower or equal to hardware MTU (and this limitation is enforced). If it equals the HW MTU, its value does not appear in the running configuration and it tracks the changes in HW MTU. For example, if you configure ip mtu 1300 on a Serial interface, it will appear in the running configuration as long as the hardware MTU is not equal to 1300 (and will not change as the HW MTU changes). However, as soon as the mtu 1300 is configured, the ip mtu 1300 command disappears from the configuration and the IP MTU yet again tracks the HW MTU.
Q292. Refer to the exhibit.
Which statement is true?
A. BGP peer 10.1.2.3 is performing inbound filtering.
B. BGP peer 10.1.2.3 is a route reflector.
C. R1 is a route reflector, but BGP peer 10.1.2.3 is not a route reflector client.
D. R1 still needs to send an update to the BGP peer 10.1.2.3.
On R1 the routing table version (Tbl Ver) for 10.1.2.3 is 1, other routers have version 2, so it needs to send an update to the 10.1.2.3 peer.
Q293. For which feature is the address family "rtfilter" used?
A. Enhanced Route Refresh
B. MPLS VPN filtering
C. Route Target Constraint
D. Unified MPLS
With Multiprotocol Label Switching (MPLS) VPN, the internal Border Gateway Protocol (iBGP) peer or Route Reflector (RR) sends all VPN4 and/or VPN6 prefixes to the PE routers. The PE router drops the VPN4/6 prefixes for which there is no importing VPN routing and forwarding (VRF). This is a behavior where the RR sends VPN4/6 prefixes to the PE router, which it does not need. This is a waste of processing power on the RR and the PE and a waste of bandwidth. With Route Target Constraint (RTC), the RR sends only wanted VPN4/6 prefixes to the PE. 'Wanted' means that the PE has VRF importing the specific prefixes. RFC 4684 specifies Route Target Constraint (RTC). The support is through a new address family rtfilter for both VPNv4 and VPNv6.
Q294. Refer to the exhibit.
Which two statements about this route table are true? (Choose two.)
A. The BGP routes are internal.
B. The OSPF routes with the E2 flag retain the same metric as they leave the router.
C. The OSPF routes with the IA flag have their administrative distances incremented as they leave the router.
D. The BGP routes are external.
E. The OSPF routes with the E2 flag have their metrics incremented as they leave the router.
IBGP routes have an Administrative distance of 200, while EBGP have an AD of 20. Here we see that the BGP routes have an AD value of 200.
With OSPF, external routes fall under two categories, external type 1 and external type 2.
The difference between the two is in the way the cost (metric) of the route is being calculated. The cost of a type 2 route is always the external cost, irrespective of the interior cost to reach that route. A type 1 cost is the addition of the external cost and the internal cost used to reach that route. The metric for E2 routes do not change when advertising to other routers.
Q295. Refer to the exhibit.
All switches have default bridge priorities, and originate BPDUs with MAC addresses as indicated. The numbers shown are STP link metrics.
After STP converges, you discover that traffic from switch SWG toward switch SWD takes a less optimal path. What can you do to optimize the STP tree in this switched network?
A. Change the priority of switch SWA to a lower value than the default value.
B. Change the priority of switch SWB to a higher value than the default value.
C. Change the priority of switch SWG to a higher value than the default value.
D. Change the priority of switch SWD to a lower value than the default value.
In this topology, we see that all port paths and priorities are the same, so the lowest MAC address will be used to determine the best STP path. From SWG, SWE will be chosen as the next switch in the path because it has a lower MAC address than SWF. From SWE, traffic will go to SWC because it has a lower MAC address, and then to SWD, instead of going from SWE directly to SWD. If we lower the priority of SWD (lower means better with STP) then traffic will be sent directly to SWD.
Q296. Which statement about a P router in a Layer 3 MPLS VPN is true?
A. It is unaware of VPN routes.
B. It connects to customer edge routers.
C. It participates in MPLS VPN routing.
D. It uses the running IGP to share VPN routes.
Q297. Refer to the exhibit.
Which LISP component do routers in the public IP network use to forward traffic between the two networks?
C. map server
D. map resolver
Locator ID Separation Protocol (LISP) is a network architecture and protocol that implements the use of two namespaces instead of a single IP address:
. Endpoint identifiers (EIDs)—assigned to end hosts.
. Routing locators (RLOCs)—assigned to devices (primarily routers) that make up the global routing system. The public networks use the RLOC to forward traffic between networks.
Q298. Refer to the exhibit.
Which statement is true?
A. This is an MPLS TE point-to-multipoint LSP in an MPLS network.
B. This is an MPLS TE multipoint-to-point LSP in an MPLS network.
C. This is a point-to-multipoint LSP in an MPLS network.
D. This is a multipoint-to-multipoint LSP in an MPLS network.
Same example of this provided on slide 24 at the reference link below:
Reference: “mVPN Deployment Models” Cisco Live Presentation
http://d2zmdbbm9feqrf.cloudfront.net/2014/eur/pdf/BRKIPM-2011.pdf, slide 24
Q299. Which two statements are true about AAA? (Choose two.)
A. AAA can use RADIUS, TACACS+, or Windows AD to authenticate users.
B. If RADIUS is the only method configured in AAA, and the server becomes unreachable,
the user will be able to log in to the router using a local username and password.
C. If the local keyword is not included and the AAA server does not respond, then authorization will never be possible and the connection will fail.
D. AAA can be used to authenticate the enable password with a AAA server.
AAA can be used to authenticate user login and the enable passwords.
Example 1: Same Exec Authentication Methods for All Users
Once authenticated with:
aaa authentication login default group radius local
All users who want to log in to the access server have to be authorized using Radius (first method) or local database (second method).
aaa authorization exec default group radius local
Note. On the AAA server, Service-Type=1 (login) must be selected.
Note. With this example, if the local keyword is not included and the AAA server does not respond, then authorization will never be possible and the connection will fail.
Q300. Which three EIGRP packet types are valid? (Choose three.)
EIGRP uses the following packet types: hello and acknowledgment, update, and query and reply.
Hello packets are multicast for neighbor discovery/recovery and do not require acknowledgment. An acknowledgment packet is a hello packet that has no data. Acknowledgment packets contain a nonzero acknowledgment number and always are sent by using a unicast address.
Update packets are used to convey reachability of destinations. When a new neighbor is discovered, unicast update packets are sent so that the neighbor can build up its topology table. In other cases, such as a link-cost change, updates are multicast. Updates always are transmitted reliably.
Query and reply packets are sent when a destination has no feasible successors. Query packets are always multicast. Reply packets are sent in response to query packets to instruct the originator not to recompute the route because feasible successors exist. Reply packets are unicast to the originator of the query. Both query and reply packets are transmitted reliably.