[Free] 2019(Nov) EnsurePass Cisco 400-101 Dumps with VCE and PDF 301-310

Get Full Version of the Exam

Question No.301



Correct Answer:


Question No.302

Refer to the exhibit. Which LISP component do routers in the public IP network use to forward traffic between the two networks?


  1. EID

  2. RLOC

  3. map server

  4. map resolver

Correct Answer: B


Locator ID Separation Protocol (LISP) is a network architecture and protocol that implements the use of two namespaces instead of a single IP address:

Endpoint identifiers (EIDs)-assigned to end hosts.

Routing locators (RLOCs)-assigned to devices (primarily routers) that make up the global routing system. The public networks use the RLOC to forward traffic between networks.

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_lisp/configuration/15-mt/irl- 15-mt-book/irl-overview.html

Question No.303

By default, how does a GET VPN group member router handle traffic when it is unable to register to a key server?

  1. All traffic is queued until registration is successful or the queue is full.

  2. All traffic is forwarded through the router unencrypted.

  3. All traffic is forwarded through the router encrypted.

  4. All traffic through the router is dropped.

Correct Answer: B


In the basic GETVPN configuration, the traffic passing through group members will be sent in clear until it registers with the Key Server. This is because the crypto ACL is configured on the KS and GM will get that information only after the registration is successful. This means for a short period of time the traffic can go out unencrypted after a GM is booted up or the existing GETVPN session is cleared manually. This mode is called quot;fail openquot; and it is the default behavior. This behavior can be turned off by configuring quot;Fail Closequot; mode on the GMs.

Reference: http://www.cisco.com/c/en/us/products/collateral/security/group-encrypted-transport- vpn/deployment_guide_c07_554713.html

Question No.304

Which action does route poisoning take that serves as a loop-prevention method?

  1. It immediately sends routing updates with an unreachable metric to all devices.

  2. It immediately sends routing updates with a metric of 255 to all devices.

  3. It prohibits a router from advertising back onto the interface from which it was learned.

  4. It advertises a route with an unreachable metric back onto the interface from which it was learned.

  5. It poisons the route by tagging it uniquely within the network.

Correct Answer: A


With route poisoning, when a router detects that one of its connected routes has failed, the router will poison the route by assigning an infinite metric to it and advertising it to neighbors.

Question No.305



Correct Answer:


Question No.306

Refer to the exhibit. How can the EIGRP hello and hold time for Gig0/0 be changed to 5 and 15?


  1. No action is required, since Gig0/0 is not listed with a nondefault hello and hold time.

  2. Add the commands ip hello-interval eigrp 1 5 and ip hold-time eigrp 1 15 under interface Gig0/0.

  3. Add the commands hello-interval 5 and hold-time 15 under quot;af-interface Gig0/0quot; under the address family.

  4. Add the commands default hello-interval and default hold-time under the af-interface Gig0/0 statement under the address family.

Correct Answer: C


To configure the hello interval for an interface, use the hello-interval command in interface configuration mode.

To configure the hold time for an interface, use the hold-time command in interface configuration mode.

Reference: http://www.cisco.com/c/en/us/td/docs/routers/crs/software/crs_r4- 1/routing/command/reference/b_routing_cr41crs/b_routing_cr41crs_chapter_010.html#wp232306

Question No.307

Which two options are the two main phases of PPPoE? (Choose two.)

  1. Active Discovery Phase

  2. IKE Phase

  3. Main Mode Phase

  4. PPP Session Phase

  5. Aggressive Mode Phase

  6. Negotiation Phase

Correct Answer: AD


PPPoE is composed of two main phases:

Active Discovery PhaseIn this phase, the PPPoE client locates a PPPoE server, called an access concentrator. During this phase, a Session ID is assigned and the PPPoE layer is established.

PPP Session PhaseIn this phase, PPP options are negotiated and authentication is performed. Once the link setup is completed, PPPoE functions as a Layer 2 encapsulation method, allowing data to be transferred over the PPP link within PPPoE headers.

Reference: http://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/vpn/asa-vpn- cli/vpn-pppoe.html

Question No.308

Refer to the exhibit. R1 is able to reach only some of the subnets that R2 is advertising. Which two configuration changes can you make to ensure that R1 can reach all routes from R2? (Choose two.)


  1. Add an additional permit statement to the LOOPBACKS route map.

  2. Modify the LOOPBACKS access list to include all loopback subnets.

  3. Add an additional statement in the LOOPBACKS route map to match both Level 1 and Level 2 circuits.

  4. Add an additional statement in the LOOPBACKS route map to match the R1 CLNS address.

  5. Configure the interfaces between R1 and R2 with a Level 1 IS-IS circuit.

  6. Configure the interfaces between R1 and R2 with a Level 2 IS-IS circuit.

Correct Answer: AB


In this example, the access list is using a wildcard mask, so only the loopback IP#39;s of – will be included. We need to add another statement to allow loopback 4 to be advertised, or modify the wildcard mask to include them all.

Question No.309

For which feature is the address family quot;rtfilterquot; used?

  1. Enhanced Route Refresh

  2. MPLS VPN filtering

  3. Route Target Constraint

  4. Unified MPLS

Correct Answer: C


With Multiprotocol Label Switching (MPLS) VPN, the internal Border Gateway Protocol (iBGP) peer or Route Reflector (RR) sends all VPN4 and/or VPN6 prefixes to the PE routers. The PE router drops the VPN4/6 prefixes for which there is no importing VPN routing and forwarding (VRF). This is a behavior where the RR sends VPN4/6 prefixes to the PE router, which it does not

need. This is a waste of processing power on the RR and the PE and a waste of bandwidth. With Route Target Constraint (RTC), the RR sends only wanted VPN4/6 prefixes to the PE. #39;Wanted#39; means that the PE has VRF importing the specific prefixes. RFC 4684 specifies Route Target Constraint (RTC). The support is through a new address family rtfilter for both VPNv4 and VPNv6. Reference: http://www.cisco.com/c/en/us/support/docs/multiprotocol-label-switching- mpls/mpls/116062-technologies-technote-restraint-00.html

Question No.310

When you configure the ip pmtu command under an L2TPv3 pseudowire class, which two things can happen when a packet exceeds the L2TP path MTU? (Choose two.)

  1. The router drops the packet.

  2. The router always fragments the packet after L2TP/IP encapsulation.

  3. The router drops the packet and sends an ICMP unreachable message back to the sender only if the DF bit is set to 1.

  4. The router always fragments the packet before L2TP/IP encapsulation.

  5. The router fragments the packet after L2TP/IP encapsulation only if the DF bit is set to 0.

  6. The router fragments the packet before L2TP/IP encapsulation only if the DF bit is set to 0.

Correct Answer: CF


If you enable the ip pmtu command in the pseudowire class, the L2TPv3 control channel participates in the path MTU discovery. When you enable this feature, the following processing is performed:

ICMP unreachable messages sent back to the L2TPv3 router are deciphered and the tunnel MTU is updated accordingly. In order to receive ICMP unreachable messages for fragmentation errors, the DF bit in the tunnel header is set according to the DF bit value received from the CE, or statically if the ip dfbit set option is enabled. The tunnel MTU is periodically reset to the default value based on a periodic timer.

ICMP unreachable messages are sent back to the clients on the CE side. ICMP unreachable messages are sent to the CE whenever IP packets arrive on the CE-PE interface and have a packet size greater than the tunnel MTU. A Layer 2 header calculation is performed before the ICMP unreachable message is sent to the CE.

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/l2tpv325.html

Get Full Version of the Exam
400-101 Dumps
400-101 VCE and PDF