[Free] 2019(Nov) EnsurePass Cisco 400-101 Dumps with VCE and PDF 201-210

Get Full Version of the Exam

Question No.201

You are backing up a server with a 1 Gbps link and a latency of 2 ms. Which two statements about the backup are true? (Choose two.)

  1. The bandwidth delay product is 2 Mb.

  2. The default TCP send window size is the limiting factor.

  3. The default TCP receive window size is the limiting factor.

  4. The bandwidth delay product is 500 Mb.

  5. The bandwidth delay product is 50 Mb.

Correct Answer: AC


1 Gbps is the same as 1000 Mbps, and 1000Mb x .0002 = 2 Mbps. With TCP based data transfers, the receive window is always the limiting factor, as the sender is generally able to send traffic at line rate, but then must wait for the acknowledgements to send more data.

Question No.202

Which neighbor-discovery message type is used to verify connectivity to a neighbor when the link-layer address of the neighbor is known?

  1. neighbor solicitation

  2. neighbor advertisement

  3. router advertisement

  4. router solicitation

Correct Answer: A


IPv6 Neighbor Solicitation Message

A value of 135 in the Type field of the ICMP packet header identifies a neighbor solicitation message. Neighbor solicitation messages are sent on the local link when a node wants to determine the link-layer address of another node on the same local link (see the figure below). When a node wants to determine the link-layer address of another node, the source address in a neighbor solicitation message is the IPv6 address of the node sending the neighbor solicitation message. The destination address in the neighbor solicitation message is the solicited-node multicast address that corresponds to the IPv6 address of the destination node. The neighbor solicitation message also includes the link-layer address of the source node.

Figure 1. IPv6 Neighbor Discovery: Neighbor Solicitation Message


Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_basic/configuration/xe-3s/ip6b- xe-3s-book/ip6-neighb-disc-xe.html

Question No.203

Refer to the exhibit. If the traffic flowing from network to is unencrypted, which two actions must you take to enable encryption? (Choose two).


  1. Configure the transform-set on R2 to match the configuration on R1.

  2. Configure the crypto map on R2 to include the correct subnet.

  3. Configure the ISAKMP policy names to match on R1 and R2.

  4. Configure the crypto map names to match on R1 and R2.

  5. Configure the Diffie-Hellman keys used in the ISAKMP policies to be different on R1 and R2.

Correct Answer: AB


A transform set combines an encryption method and an authentication method. During the IPsec security association negotiation with ISAKMP, the peers agree to use a particular transform set to protect a particular data flow. The transform set must be the same for both peers. Also, the crypto map on R2 points to the address name of VPN, which includes, but it should be the local subnet of

Question No.204

Refer to the exhibit. Router 1 and Router 2 use HSRP to provide first hop redundancy for hosts on the network. Which feature can provide additional failover coverage for the PC?


  1. Cisco Express Forwarding

  2. NetFlow

  3. Accounting

  4. Enhanced Object Tracking

Correct Answer: D


HSRP has a mechanism for tracking the interface line-protocol state. The enhanced object tracking feature separates the tracking mechanism from HSRP. It creates a separate, standalone tracking process that can be used by processes other than HSRP. This feature allows tracking of other objects in addition to the interface line-protocol state. A client process, such as HSRP, can register an interest in tracking objects and request notification when the tracked object changes state. Several clients can track the same object, and can take different actions when the object changes state. This feature increases the availability and speed of recovery of a router system and decreases outages and outage duration

Reference: http://www.cisco.com/c/en/us/td/docs/switches/blades/3040/software/release/12- 2_44_se/configuration/guide/swhsrp.html#wp1083927

Question No.205

What is the ip dhcp snooping information option command used for?

  1. It displays information about the DHCP snooping table.

  2. It sends a syslog and an SNMP trap for a DHCP snooping violation.

  3. It enables the DHCP snooping host tracking feature.

  4. It enables DHCP option 82 data insertion.

Correct Answer: D


To enable DHCP option-82 data insertion, perform this task:

Command Purpose

Step 1

Router(config)# ip dhcp snooping information option Enables DHCP option-82 data insertion.

Step 2

Router(config)# ip dhcp snooping information option replace Or:

Router(config-if)# ip dhcp snooping information option replace

(Optional) Replaces the DHCP relay information option received in snooped packets with the switch#39;s option-82 data.

Step 3

Router(config)# do show ip dhcp snooping | include 82 Verifies

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12- 2SX/configuration/guide/book/snoodhcp.html

Question No.206

Which two Cisco Express Forwarding tables are located in the data plane? (Choose two.)

  1. the forwarding information base

  2. the label forwarding information base

  3. the IP routing table

  4. the label information table

  5. the adjacency table

Correct Answer: AB


The control plane runs protocols such as OSPF, BGP, STP, LDP. These protocols are needed so that routers and switches know how to forward packets and frames. The data plane is where the actual forwarding takes place. The data plane is populated based on the protocols running in the control plane. The Forwarding Information Base (FIB) is used for IP traffic and the Label FIB is used for MPLS.

Question No.207

Which two statements about the metric-style wide statement as it applies to route redistribution are true? (Choose two.)

  1. It is used in IS-IS.

  2. It is used in OSPF.

  3. It is used in EIGRP.

  4. It is used for accepting TLV.

  5. It is used in PIM for accepting mroutes.

  6. It is used for accepting external routes.

Correct Answer: AD


To configure a router running IS-IS to generate and accept only new-style TLVs (TLV stands for type, length, and value object), use the metric-style wide command.

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/TE_1208S.html#wp49409

Question No.208

Refer to the exhibit. All switches have default bridge priorities, and originate BPDUs with MAC addresses as indicated. The numbers shown are STP link metrics. After STP converges, you discover that traffic from switch SWG toward switch SWD takes a less optimal path. What can you do to optimize the STP tree in this switched network?


  1. Change the priority of switch SWA to a lower value than the default value.

  2. Change the priority of switch SWB to a higher value than the default value.

  3. Change the priority of switch SWG to a higher value than the default value.

  4. Change the priority of switch SWD to a lower value than the default value.

Correct Answer: D


In this topology, we see that all port paths and priorities are the same, so the lowest MAC address will be used to determine the best STP path. From SWG, SWE will be chosen as the next switch in the path because it has a lower MAC address than SWF. From SWE, traffic will go to SWC because it has a lower MAC address, and then to SWD, instead of going from SWE directly to SWD. If we lower the priority of SWD (lower means better with STP) then traffic will be sent directly to SWD.

Question No.209

Refer to the exhibit. Which statement describes what the authoritative flag indicates?


  1. Authentication was used for the mapping.

  2. R1 learned about the NHRP mapping from a registration request.

  3. Duplicate mapping in the NHRP cache is prevented.

  4. The registration request had the same flag set.

Correct Answer: B Explanation: Show NHRP: Examples:

The following is sample output from the show ip nhrp command: Router# show ip nhrp, tunnel 100 created 0:00:43 expire 1:59:16 Type. dynamic Flags: authoritative

NBMA address: 10.1111.1111.1111.1111.1111.1111.1111.1111.1111.11, Tunnel0 created 0:10:03 expire 1:49:56 Type. static Flags: authoritative

The fields in the sample display are as follows: Flags:

authoritativeIndicates that the NHRP information was obtained from the Next Hop Server or router that maintains the NBMA-to-IP address mapping for a particular destination.

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_4/ip_addr/configuration/guide/hadnhrp.html

Question No.210

Which type of OSPF packet is an OSPF link state update packet?

  1. type 1

  2. type 2

  3. type 3

  4. type 4

  5. type 5

Correct Answer: D


Link State Update packets are OSPF packet type 4. These packets implement the flooding of link state advertisements. Each Link State Update packet carries a collection of link state advertisements one hop further from its origin. Several link state advertisements may be included in a single packet.

Reference: http://www.freesoft.org/CIE/RFC/1583/107.htm

Get Full Version of the Exam
400-101 Dumps
400-101 VCE and PDF