[Free] 2019(Nov) EnsurePass Cisco 400-101 Dumps with VCE and PDF 261-270

Get Full Version of the Exam

Question No.261

Refer to the exhibit. All switches are Cisco switches. Assume that Cisco Discovery Protocol is enabled only on switches A and C. Which information is returned when you issue the command show cdp neighbors on switch C?


  1. a limited amount of information about switch B

  2. no neighbor details will be returned

  3. neighbor details for switch B

  4. neighbor details for switch A

  5. neighbor details for switch C

Correct Answer: B


CDP is used to discover information on directly connected neighbors only, so in this case SwitchC would only be able to obtain CDP information from SwitchB. However, since SwitchB is not running CDP then no neighbor information will be seen on SwitchC. Same goes for Switch A also in this topology.

Question No.262

Which term describes an EIGRP route that has feasible successors?

  1. active

  2. passive

  3. redistributed

  4. invalid

Correct Answer: B


A topology table entry for a destination can have one of two states. A route is considered in the Passive state when a router is not performing a route recomputation. The route is in Active state when a router is undergoing a route recomputation. If there are always feasible successors, a

route never has to go into Active state and avoids a route recomputation.

When there are no feasible successors, a route goes into Active state and a route recomputation occurs. A route recomputation commences with a router sending a query packet to all neighbors. Neighboring routers can either reply if they have feasible successors for the destination or optionally return a query indicating that they are performing a route recomputation. While in Active state, a router cannot change the next-hop neighbor it is using to forward packets. Once all replies are received for a given query, the destination can transition to Passive state and a new successor can be selected.

Reference: http://docwiki.cisco.com/wiki/Enhanced_Interior_Gateway_Routing_Protocol

Question No.263

You are tasked with configuring a router on an OSPF domain to import routes from an EIGRP domain and summarize the routes to Which statement configures the summarized route and provides equal-path route redundancy?

A. area 32 range cost 100

B. area 32 range cost 100

C. area 32 range cost 100

D. area 32 range multi-path

Correct Answer: A


area range

To consolidate and summarize routes at an area boundary, use the area range command in router configuration mode. To disable this function, use the no form of this command.

Syntax Description area-id

Identifier of the area about which routes are to be summarized. It can be specified as either a decimal value or as an IP address.

ip-address IP address. mask

IP address mask. advertise

(Optional) Sets the address range status to advertise and generates a Type 3 summary link-state advertisement (LSA).


(Optional) Sets the address range status to DoNotAdvertise. The Type 3 summary LSA is suppressed, and the component networks remain hidden from other networks.

cost cost

(Optional) Metric or cost for this summary route, which is used during OSPF SPF calculation to determine the shortest paths to the destination. The value can be 0 to 16777215.

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/iproute/command/reference/fiprrp_r/1rfospf.html#w p1017596

Question No.264



Correct Answer:


Question No.265

Refer to the exhibit. Routers R1 and R2 are configured as shown, and traffic from R1 fails to reach host Which action can you take to correct the problem?


  1. Ensure that R2 has a default route in its routing table.

  2. Change the OSPF area type on R1 and R2.

  3. Edit the router configurations so that address is a routable address.

  4. Remove the default-information originate command from the OSPF configuration of R2.

Correct Answer: A


Not sure that any of these answers are correct, it appears that this configuration is valid for reaching that one specific host IP. Answer A does have a route to that host so it would not need a default route to get to it. Choice B is incorrect as the area types have nothing to do with this. C is incorrect as that IP address is routable, and D is needed so that R1 will have a default route advertised to it from R2 so that it can reach this destination.

Question No.266

Which technology can be affected when switches are used that do not support jumbo frames?

A. 802.1x

  1. BFD

  2. OSPFv3 D. 802.1q

Correct Answer: D


The 802.1Q tag is 4 bytes. Therefore, the resulting Ethernet frame can be as large as 1522 bytes. If jumbo frames are not supported, then typically the MTU on an Ethernet link needs to be lowered to 1496 to support this extra 802.1Q tag.

Question No.267

Refer to the exhibit. Which two statements are true regarding prefix (Choose two.)


  1. The prefix is in policy, and Cisco PfR rerouted the traffic via Et0/1 because of an OOP event.

  2. Cisco PfR is monitoring the prefix via passive NetFlow mode only.

  3. Cisco PfR is monitoring the prefix via active, fast, or active throughput IP SLA probe mode only.

  4. The prefix is in policy, and Cisco PfR did not reroute the traffic via Et0/1 because the traffic was previously in policy.

  5. Cisco PfR is monitoring the prefix via mode monitor, which provides both NetFlow and IP SLA measurements.

Correct Answer: DE


Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/pfr/command/pfr-cr-book/pfr- s1.html#wp2707728086

Question No.268

Which two statements are true about a 6to4 tunnel connecting two IPv6 islands over the IPv4 Internet? (Choose two.)

  1. It embeds the IPv6 packet into the IPv4 payload with the protocol type set to 51.

  2. It works by appending the private IPv4 address (converted into hexadecimal format) to the

    2002::/16 prefix.

  3. It embeds the IPv6 packet into the IPv4 payload with the protocol type set to 41.

  4. It works by appending the public IPv4 address (converted into hexadecimal format) to the 2002::/16 prefix.

Correct Answer: CD


6to4 embeds an IPv6 packet in the payload portion of an IPv4 packet with protocol type 41. To send an IPv6 packet over an IPv4 network to a 6to4 destination address, an IPv4 header with protocol type 41 is prepended to the IPv6 packet. The IPv4 destination address for the prepended packet header is derived from the IPv6 destination address of the inner packet (which is in the format of a 6to4 address), by extracting the 32 bits immediately following the IPv6 destination address#39;s 2002::/16 prefix. The IPv4 source address in the prepended packet header is the IPv4 address of the host or router which is sending the packet over IPv4. The resulting IPv4 packet is then routed to its IPv4 destination address just like any other IPv4 packet.

Reference: http://en.wikipedia.org/wiki/6to4

Question No.269

Which OSPF feature supports LSA rate limiting in milliseconds to provide faster convergence?

  1. LSA throttling

  2. incremental SPF

  3. fast hello

  4. SPF tuning

Correct Answer: A


The OSPF Link-State Advertisement (LSA) Throttling feature provides a dynamic mechanism to slow down link-state advertisement (LSA) updates in OSPF during times of network instability. It also allows faster Open Shortest Path First (OSPF) convergence by providing LSA rate limiting in milliseconds.

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/fsolsath.html

Question No.270

Which statement describes the function of rekey messages?

  1. They prevent unencrypted traffic from passing through a group member before registration.

  2. They refresh IPsec SAs when the key is about to expire.

  3. They trigger a rekey from the server when configuring the rekey ACL.

  4. They authenticate traffic passing through a particular group member.

Correct Answer: B


Rekey messages are used to refresh IPsec SAs. When the IPsec SAs or the rekey SAs are about to expire, one single rekey message for a particular group is generated on the key server. No new IKE sessions are created for the rekey message distribution. The rekey messages are distributed by the key server over an existing IKE SA. Rekeying can use multicast or unicast messages.

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_getvpn/configuration/xe- 3s/sec-get-vpn-xe-3s-book/sec-get-vpn.html

Get Full Version of the Exam
400-101 Dumps
400-101 VCE and PDF