This page was exported from Quickly Pass Test With Lead2pass New Brain Dumps [ ] Export date:Mon Mar 8 19:17:08 2021 / +0000 GMT ___________________________________________________ Title: [2017 New] Lead2pass Provides Free 400-201 Exam Dumps PDF (121-140) --------------------------------------------------- 2017 August Cisco Official New Released 400-201 Dumps in! 100% Free Download! 100% Pass Guaranteed! We are providing 400-201 exam braindumps here in both PDF file and Online Practice Test Formats. The 400-201 dumps are updated time to time having all the questions answers which cover complete course outlines of the 400-201 certification exam. Following questions and answers are all new published by Cisco Official Exam Center: QUESTION 121Where are MPLS point-to-multipoint traffic engineering packets replicated? A.    head-end routerB.    branch-point routerC.    midpoint routerD.    leaf-point routerE.    tail-end routerAnswer: B QUESTION 122What are the two benefits of graceful restart? (Choose two) A.    Graceful restart allows session information recovery without disruption to the network.B.    A node can perform a graceful restart to help a neighbor recover its state. The label bindings are kept on state information, which helps the failed node recover faster and does not affect the current forward traffic.C.    Graceful restart allows a node to recover state from its neighbor when there is no RP or before the device undergoes SSO.D.    Graceful restart does not allow session information recovery.E.    During a graceful restart, the router removes any stale prefixes after a timer for stale entries expires Answer: AB QUESTION 123A network engineer needs to connect two core switches that use Gigabit Ethernet interfaces in an MPLS backbone and that are separated by a distance of 60 km. Which Cisco GBIC achieves this goal? A.    Cisco 1000BASE-T GBICB.    Cisco 1000BASE-SX GBICC.    Cisco 1000BASE-LX/LH GBICD.    Cisco 1000BASE-ZX GBIC Answer: DExplanation: QUESTION 124Refer to the exhibit. A customer is running IS-IS within a network and is using BGP as a CE-PE routing protocol. Which action allows CE1 to get the subnet over the CE1-PE1 link, regardless of whether there is a flap in the MPLS link or backdoor link?   A.    Configure the neighbor <PE1-IP> weight 33768 command on CE1 under the BGP process.B.    Configure the distance bgp 115 200 200 command on CE1 under the BGP process.C.    Configure the distance 30 ip command on CE1 under the IS-IS process.D.    Configure the distance bgp 115 200 200 command on CE2 under the BGP process.E.    Configure the neighbor <PE1-IP> weight 33768 command on CE2 under the BGP process. Answer: A QUESTION 125Which information is carried in the OSPFv3 intra-area Prefix LSA? A.    All link-local addressesB.    All IPv6 prefix and topology information that OSPFv2 included in Router LSA and Network LSAC.    List of options associated with the link to all other routers attached to the linkD.    All prefix-specific information that OSPFv2 included in Router LSA and Network LSA Answer: DExplanation:OSPFv3's new LSA, the Intra-area Prefix LSA (type 9), handles intra-area network information that was previously included in OSPFv2 type 2 LSAs. It is used in order to advertise one or more IPv6 prefixes. The prefixes are associated with router segment, stub network segment or transit network segment. Intra-area prefix LSAs (type 9) & Inter-Area- Prefix-LSA (type 3) carry all IPv6 prefix information, which, in IPv4, is included in router LSAs and network LSAs. QUESTION 126Drag and Drop Questions   Answer:   QUESTION 127Drag and Drop Questions   Answer:   QUESTION 128The Attribute field within the IS-IS LSP header contains which of the following flags? (Choose four) A.    IS-TypeB.    Overload (LSPDBOL)C.    Pseudonode (PN)D.    Attached (ATT)E.    Fragment (Frag-Nr)F.    Partition (P) Answer: ABDF QUESTION 129Which of the following are steps to configure destination-based Remote Triggered Black Hole (RTBH) filtering? (Choose three.) A.    Configure BGP between trigger and black hole routers.B.    Configure OSPF between trigger router and black hole routesC.    Configure all edge routers with static (reserved) host route to Null0D.    Configure on trigger router to advertise victim host route with communityE.    Activate black hole by redistributing route for victim into BGP with next-hop set to the static (reserved) hostroute configured on edge routers. Answer: ACE QUESTION 130Which four services use the inner labels of an MPLS label stack? (Choose four) A.    MPLS VPNB.    switching path in MPLS coreC.    Cisco MPLS Traffic Engineering and Fast RerouteD.    MPLS over ATME.    VPN over Traffic Engineering coreF.    any transport over MPLS Answer: ACEF QUESTION 131What BGP feature improves on DDOS mitigation by allowing instructions that are more granular and allow for source address, destination, address, L4 details, and packet specifics to be analyzed? A.    RCMDB.    RTBHC.    BGP FlowspecD.    BGPSec Answer: CExplanation: QUESTION 132In which of the following BGP-related events is an End-of-RIB (EOR) message sent? (Choose two.) A.    Following a link flap in the BGP speaker's ASB.    During initial convergence.C.    Following a Route Processor Switchover.D.    Just before sending a CEASE message to tear down the session.E.    During capability negotiation Answer: BC QUESTION 133Which description of BGP authentication is true? A.    MD5 has been used by BGP to encrypt BGP update packets.B.    BGP uses a message-digest algorithm to authenticate BGP peersC.    A plain-text password authentication is an option of BGP authenticationD.    EBGP peers authentication is faster than IBGP peers authenticationE.    BGP uses public key and private key to authenticate BGP peers. Answer: BExplanation:BGP AuthenticationBGP supports MD5 authentication between neighbors, using a shared password. It is configured under BGP router configuration mode with the command neighbor {ip-address | peer-group-name} password password.When authentication is configured, BGP authenticates every TCP segment from its peer and checks the source of each routing update. Most ISPs require authentication for their EBGP peers. QUESTION 134Refer to the exhibit. A network engineer must configure BFD for IS-IS between R1 and R2. In case the primary link fails, the convergence time should be less than a second.Which two IOS commands are required to meet this requirement? (Choose two.)   A.    isis bfdB.    bfd minimum-interval 250C.    bfd interval 250 min_rx 250 multiplier 3D.    bfd multiplier 3E.    bfd interval 250 min_rx 250 multiplier 4F.    bfd fast-detect ipv4 Answer: ACExplanation: QUESTION 135Refer to the exhibit. The referenced TE tunnels compete for bandwidth requirements over the limited available bandwidth that is provisioned. Which core MPLS component erases a conflict and provides admission control for any new added TE tunnel?   A.    link managementB.    link attributesC.    MPLS TE prioritiesD.    RSVP Answer: CExplanation:TE Priority allows you to give setup priority to tunnels. QUESTION 136Refer to the exhibit. OSPFv3 is already running, and R1 has added a new subnet (loopback 11). What is the reason code on R4 when executing the command show ipv6 ospf statistics?   A.    P (partial)B.    N (network)C.    R (router)D.    L (link) Answer: C QUESTION 137Which are the two fundamental ways in which IEEE 1588 differs from SyncE? (Choose two.) A.    In addition to frequency synchronization, it achieves ToD synchronization to achieve phase alignment which is required for multi-channel communication.B.    It is a purely-based solution, with the actual clock values being passed inside the payloads of special packets dedicated to that task.C.    It offers two major changes over traditional Ethernet to make it suitable for clock distribution: a mandated clock accuracy and the ESMC protocol for clock selection, distribution, management, traceability, and failover.D.    SyncE is a Cisco proprietary ToD technology where IEEE 1588 is a industry standard recommended for interoperability across vendor devices.E.    IEEE 1588 applies to voice-only systems or with low-bandwidth data traffic. Answer: ABExplanation: QUESTION 138What are the four key design requirements for mobile IP backhaul? (Choose four.) A.    X2 interface turning pointB.    bandwidthC.    Layer 2 TunnelingD.    native IPv6 supportE.    DiffServ QoSF.    MPLS-enabled interfaceG.    network timing distribution and recoveryH.    mandatory Layer 3 access up to a cell site Answer: CDGHExplanation: QUESTION 139Refer to the exhibit. The Service Provider does not have IPv6 support in the core, however it does have MPLS support. Customer requires IPv6 connectivity in all sites including Internet access. Without a requirement to create VRF, which method is preferred to support IPv6 traffic between these sites?   A.    6VPEB.    H-VPLSC.    L2TPv3D.    VPLSE.    6CEF.    6PE Answer: FExplanation: QUESTION 140Which 4 statements regarding MPLS Label Stack Encoding is true? A.    A value of 4 represents the "Implicit NULL Label."B.    A value of 0 represents the "IPv4 Explicit NULL Label."C.    A value of 1 represents the "Router Alert Label".D.    A value of 2 represents the "IPv6 Explicit NULL Label"E.    A value of 1 represents the "IPv1 Explicit NULL Label"F.    A value of 3 represents the "Implicit NULL Label" Answer: BCDFExplanation:A value of 0 represents the "IPv4 Explicit NULL Label". This label indicates that the label stack must be popped, and the packet forwarding must be based on the IPv4 header. This helps to keep Exp bits safe until the egress router. It is used in MPLS based QoS. A value of 1 represents the "Router Alert Label". When a received packet contains this label value at the top of the label stack, it is delivered to a local software module for processing. The actual packet forwarding is determined by the label beneath it in the stack. However, if the packet is forwarded further, the Router Alert Label should be pushed back onto the label stack before forwarding. The use of this label is analogous to the use of the "Router Alert Option" in IP packets (for example, ping with record route option)A value of 2 represents the "IPv6 Explicit NULL Label". It indicates that the label stack must be popped, and the packet forwarding must be based on the IPv6 header. A value of 3 represents the "Implicit NULL Label". This is a label that an LSR can assign and distribute.However, it never actually appears in the encapsulation. It indicates that the LSR pops the top label from the stack and forwards the rest of the packet (labeled or unlabeled) through the outgoing interface (as per the entry in Lfib). Although this value might never appear in the encapsulation, it needs to be specified in the Label Distribution Protocol, so a value is reserved. The 400-201 online practice test prepare you according to the real exam scenario. Free demo is available to check before buying the 400-201 study guide. 400-201 new questions on Google Drive: 2017 Cisco 400-201 exam dumps (All 647 Q&As) from Lead2pass: [100% Exam Pass Guaranteed] --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2017-08-08 03:40:47 Post date GMT: 2017-08-08 03:40:47 Post modified date: 2017-08-08 03:40:47 Post modified date GMT: 2017-08-08 03:40:47 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from