400-101 CCIE Routing Switching Written Certify Practice Exam

400-101 CCIE Routing Switching Written Certify Practice Exam

400-101 CCIE Routing Switching Written Certify Practice Exam

Another administrator has configured NetFlow for your company’s network. You want to verify that the FastEthernet 0/0 interface on RouterA is being used to monitor inbound flows. Which of the following commands should you issue? (Select the best answer.)

show flow exporter

show flow-sampler

show ip flow export

show ip flow interface

Which of the following actions should you perform in order to drop unencrypted traffic sent from an unregistered group member? (Select the best answer.)

Enable the Fail-Close feature.

Disable the Fail-Close feature.

Enable SAR.

Disable SAR.

All unencrypted traffic sent from an unregistered group member is dropped by default, so no action is necessary.

You have issued the following commands on RouterA: Pseudowire-class boson ip pmtu RouterA receives a packet that is larger than the path MTU and that has a DF bit set to 0. Which of the following will RouterA do? (Select 2 choices.)

RouterA will forward the packet.

RouterA will drop the packet.

RouterA will return an ICMP unreachable message to the sender.

RouterA will fragment the packet before L2TP/IP encapsulation occurs.

RouterA will fragment the packet after L2TP/IP encapsulation has occurred.

In which of the following locations does BGP PIC store an alternate path? (Select the best answer.)

only in the RIB

only in the FIB

only in CEF

only in the RIB and the FIB

in the RIB, in the FIB, and in CEF

Which of the following command sets should you issue on Router A to set the next hop to 192.168.1.1 only for packets that are destined to the 10.17.88.0/24 network or sent from 172.16.223.82? (Select the best answer.)

Router A(config)#accesslist 101 permit ip host 172.16.223.82 10.17.88.0 0.0.0.255 Router A(config)#routemap map1 permit 10 Router A(configroutemap)#match ip address 101 Router A(configroutemap)#set nexthop 192.168.1.1

Router A(config)#accesslist 101 permit ip 10.17.88.0 0.0.0.255 host 172.16.223.82 Router A(config)#routemap map1 permit 10 Router A(configroutemap)#match ip address 101 RouterA(configroutemap)#set nexthop 192.168.1.1

RouterA(config)#accesslist 101 permit ip any 10.17.88.0 0.0.0.255 RouterA(config)#accesslist 101 permit ip host 172.16.223.82 any RouterA(config)#routemap map1 permit 10 Router A(configroutemap)#match ip address 101 Router A(configroutemap)#set nexthop 192.168.1.1

Router A(config)#accesslist 101 permit ip 10.17.88.0 0.0.0.255 any Router A(config)#accesslist 101 permit ip any host 172.16.223.82 Router A(config)#routemap map1 permit 10 Router A(configroutemap)#match ip address 101 Router A(configroutemap)#set nexthop 192.168.1.1

Sample Questions

Q) Which of the following commands can you issue to limit EIGRP queries? (Select 2 choices.) eigrp stub

a) router eigrp as-number

b) .ip summary-address eigrp as-number address mask

c) ip hello-interval eigrp as-number seconds

d) ip hold-time eigrp as-number seconds

Q) Which of the following terms refers to a congestion avoidance mechanism? (Select the best answer.)

a) tail drop

b) .global synchronization

c) queuing

d) TCP starvation

Q) Which of the following terms best describe the origin, ASpath, and next hop BGP attributes? (Select 2 choices.)

a) optional

b) mandatory

c) discretionary

d) .transitive

e) nontransitive

g) well-known

Q) Which of the following statements are true regarding RADIUS? (Select 2 choices.)

a) RADIUS is an IETF standard protocol.

b) RADIUS uses TCP port 49.

c) RADIUS encrypts the entire packet during transmission.

d) RADIUS combines authentication and authorization into a single function.

Q) Which of the following statements are true regarding OSPFv3? (Select 3 choices.)

a) OSPFv3 does not support IPv6.

b) .Enabling OSPFv3 on an interface enables the OSPFv3 routing process on the router.

c) The BDR is elected before the DR is elected.

d) OSPFv3 supports multiple instances on a single link.




Agile project management Artificial Intelligence aws blockchain cloud computing coding interview coding interviews Collaboration Coursera css cybersecurity cyber threats data analysis data breaches data science data visualization devops django docker finance flask hacking html It Certification java javascript ketan kk Kubernetes machine learning machine learning engineer mongoDB Network & Security network protocol nodejs online courses online learning Operating Systems Other It & Software python Software Engineering Terraform Udemy courses VLAN web development

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.