Press "Enter" to skip to content

Pass Guarantee 400-101 Exam By Taking CertBus New Cisco 400-101 VCE And PDF Braindumps

CertBus 2018 Valid Cisco 400-101 CCIE Exam VCE and PDF Dumps for Free Download!

400-101 CCIE Exam PDF and VCE Dumps : 1379QAs Instant Download: [100% 400-101 Exam Pass Guaranteed or Money Refund!!]
☆ Free view online pdf on CertBus free test 400-101 PDF:
☆ CertBus 2018 Valid 400-101 CCIE exam Question PDF Free Download from Google Drive Share:

Following 400-101 1379QAs are all new published by Cisco Official Exam Center

CertBus has the latest update version of Cisco CCIE Oct 10,2018 Newest 400-101 study guide exam, which is a hot exam of Cisco CCIE certification. CertBus Cisco CCIE exam dumps will fill you with confidence to pass this certification exam with a satisfied high score.

CertBus – provide the latest 400-101 real exam practice questions and answers. CertBus – pass all 400-101 certification exams easily with our real exam practice. latest update and experts revised. pass the 400-101 exam on your first attempt with CertBus! CertBus – the most professional provider of all 400-101 certifications. pass all the 400-101 exam easily.

We CertBus has our own expert team. They selected and published the latest 400-101 preparation materials from Cisco Official Exam-Center:


Which statement is true about TCN propagation?

A. The originator of the TCN immediately floods this information through the network.

B. The TCN propagation is a two step process.

C. A TCN is generated and sent to the root bridge.

D. The root bridge must flood this information throughout the network.

Answer: C



New Topology Change Mechanisms

When an 802.1D bridge detects a topology change, it uses a reliable mechanism to first notify the

root bridge.

This is shown in this diagram:

Once the root bridge is aware of a change in the topology of the network, it sets the TC flag on the

BPDUs it sends out, which are then relayed to all the bridges in the network. When a bridge

receives a BPDU with the TC flag bit set, it reduces its bridging-table aging time to forward delay

seconds. This ensures a relatively quick flush of stale information. Refer to Understanding

Spanning-Tree Protocol Topology Changes for more information on this process. This topology

change mechanism is deeply remodeled in RSTP. Both the detection of a topology change and its

propagation through the network evolve.

Topology Change Detection

In RSTP, only non-edge ports that move to the forwarding state cause a topology change. This

means that a loss of connectivity is not considered as a topology change any more, contrary to

802.1D (that is, a port that moves to blocking no longer generates a TC). When a RSTP bridge

detects a topology change, these occur:

It starts the TC While timer with a value equal to twice the hello-time for all its non-edge

designated ports and its root port, if necessary.

It flushes the MAC addresses associated with all these ports.

Note: As long as the TC While timer runs on a port, the BPDUs sent out of that port have the TC

bit set.

BPDUs are also sent on the root port while the timer is active.

Topology Change Propagation

When a bridge receives a BPDU with the TC bit set from a neighbor, these occur:

It clears the MAC addresses learned on all its ports, except the one that receives the topology


It starts the TC While timer and sends BPDUs with TC set on all its designated ports and root port

(RSTP no longer uses the specific TCN BPDU, unless a legacy bridge needs to be notified).

This way, the TCN floods very quickly across the whole network. The TC propagation is now a one

step process. In fact, the initiator of the topology change floods this information throughout the

network, as opposed to 802.1D where only the root did. This mechanism is much faster than the

802.1D equivalent. There is no need to wait for the root bridge to be notified and then maintain the

topology change state for the whole network for seconds.

In just a few seconds, or a small multiple of hello-times, most of the entries in the CAM tables of

the entire network (VLAN) flush. This approach results in potentially more temporary flooding, but

on the other hand it clears potential stale information that prevents rapid connectivity restitution.



When you are troubleshooting duplex mismatches, which two errors are typically seen on the full-

duplex end? (Choose two.)

A. runts

B. FCS errors

C. interface resets

D. late collisions

Answer: A,B



Which two options are contained in a VTP subset advertisement? (Choose two.)

A. followers field

B. MD5 digest

C. VLAN information

D. sequence number

Answer: C,D


Subset Advertisements

When you add, delete, or change a VLAN in a Catalyst, the server Catalyst where the changes are

made increments the configuration revision and issues a summary advertisement. One or several

subset advertisements follow the summary advertisement. A subset advertisement contains a list

of VLAN information.

If there are several VLANs, more than one subset advertisement can be required in order to

advertise all the VLANs.

Subset Advertisement Packet Format

This formatted example shows that each VLAN information field contains information for a different

VLAN. It is ordered so that lowered-valued ISL VLAN IDs occur first:

Most of the fields in this packet are easy to understand. These are two clarifications:



Which two statements are true about traffic shaping? (Choose two.)

A. Out-of-profile packets are queued.

B. It causes TCP retransmits.

C. Marking/remarking is not supported.

D. It does not respond to BECN and ForeSight Messages.

E. It uses a single/two-bucket mechanism for metering.

Answer: A,C



Which three combinations are valid LACP configurations that will set up a channel? (Choose


A. On/On

B. On/Auto

C. Passive/Active

D. Desirable/Auto

E. Active/Active

F. Desirable/Desirable

Answer: A,C,E


Latest 400-101 Dumps400-101 Practice Test400-101 Exam Questions


Which two options does Cisco PfR use to control the entrance link selection with inbound

optimization? (Choose two.)

A. Prepend extra AS hops to the BGP prefix.

B. Advertise more specific BGP prefixes (longer mask).

C. Add (prepend) one or more communities to the prefix that is advertised by BGP.

D. Have BGP dampen the prefix.

Answer: A,C

Explanation: PfR Entrance Link Selection Control Techniques

The PfR BGP inbound optimization feature introduced the ability to influence inbound traffic. A

network advertises reachability of its inside prefixes to the Internet using eBGP advertisements to

its ISPs. If the same prefix is advertised to more than one ISP, then the network is multihoming.

PfR BGP inbound optimization works best with multihomed networks, but it can also be used with

a network that has multiple connections to the same ISP. To implement BGP inbound

optimization, PfR manipulates eBGP advertisements to influence the best entrance selection for

traffic bound for inside prefixes. The benefit of implementing the best entrance selection is limited

to a network that has more than one ISP connection.

To enforce an entrance link selection, PfR offers the following methods:

BGP Autonomous System Number Prepend When an entrance link goes out-of-policy (OOP) due

to delay, or in images prior to Cisco IOS Releases 15.2(1) T1 and 15.1(2)S, and PfR selects a

best entrance for an inside prefix, extra autonomous system hops are prepended one at a time (up

to a maximum of six) to the inside prefix BGP advertisement over the other entrances. In Cisco

IOS Releases 15.2(1)T1, 15.1(2)S, and later releases, when an entrance link goes out-of policy

(OOP) due to unreachable or loss reasons, and PfR selects a best entrance for an inside prefix,

six extra autonomous system hops are prepended immediately to the inside prefix BGP

advertisement over the other entrances. The extra autonomous system hops on the other

entrances increase the probability that the best entrance will be used for the inside prefix. When

the entrance link is OOP due to unreachable or loss reasons, six extra autonomous system hops

are added immediately to allow the software to quickly move the traffic away from the old entrance

link. This is the default method PfR uses to control an inside prefix, and no user configuration is


BGP Autonomous System Number Community Prepend

When an entrance link goes out-of-policy (OOP) due to delay, or in images prior to Cisco IOS

Releases 15.2

(1)T1 and 15.1(2)S, and PfR selects a best entrance for an inside prefix, a BGP prepend

community is attached one at a time (up to a maximum of six) to the inside prefix BGP

advertisement from the network to another autonomous system such as an ISP. In Cisco IOS

Releases 15.2(1)T1, 15.1(2)S, and later releases, when an entrance link goes out-of-policy (OOP)

due to unreachable or loss reasons, and PfR selects a best entrance for an inside prefix, six BGP

prepend communities are attached to the inside prefix BGP advertisement. The BGP prepend

community will increase the number of autonomous system hops in the advertisement of the

inside prefix from the ISP to its peers. Autonomous system prepend BGP community is the

preferred method to be used for PfR BGP inbound optimization because there is no risk of the

local ISP filtering the extra autonomous system hops. There are some issues, for example, not all

ISPs support the BGP prepend community, ISP policies may ignore or modify the autonomous

system hops, and a transit ISP may filter the autonomous system path. If you use this method of

inbound optimization and a change is made to an autonomous system, you must issue an

outbound reconfiguration using the “clear ip bgp” command.





Refer to the exhibit.

A packet from RTD with destination RTG, is reaching RTB. What is the path this packet will take

from RTB to reach RTG?




D. RTB will not be able to reach RTG since the OSPF configuration is wrong.

Answer: C



Refer to the exhibit.

After a link flap in the network, which two EIGRP neighbors will not be queried for alternative

paths? (Choose two.)







Answer: B,C



Both and are in an EIGRP Stub area

The Enhanced Interior Gateway Routing Protocol (EIGRP) Stub Routing feature improves network

stability, reduces resource utilization, and simplifies stub router configuration.

Stub routing is commonly used in a hub and spoke network topology. In a hub and spoke network,

one or more end (stub) networks are connected to a remote router (the spoke) that is connected to

one or more distribution routers (the hub). The remote router is adjacent only to one or more

distribution routers. The only route for IP traffic to follow into the remote router is through a

distribution router. This type of configuration is commonly used in WAN topologies where the

distribution router is directly connected to a WAN. The distribution router can be connected to

many more remote routers. Often, the distribution router will be connected to 100 or more remote

routers. In a hub and spoke topology, the remote router must forward all nonlocal traffic to a

distribution router, so it becomes unnecessary for the remote router to hold a complete routing

table. Generally, the distribution router need not send anything more than a default route to the

remote router.

When using the EIGRP Stub Routing feature, you need to configure the distribution and remote

routers to use EIGRP, and to configure only the remote router as a stub. Only specified routes are

propagated from the remote (stub) router. The router responds to queries for summaries,

connected routes, redistributed static routes, external routes, and internal routes with the message

“inaccessible.” A router that is configured as a stub will send a special peer information packet to

all neighboring routers to report its status as a stub router. Any neighbor that receives a packet

informing it of the stub status will not query the stub router for any routes, and a router that has a

stub peer will not query that peer. The stub router will depend on the distribution router to send the

proper updates to all peers.



Refer to the exhibit.

Why is AS 65333 in parentheses?

A. It is an external AS.

B. It is a confederation AS.

C. It is the AS of a route reflector.

D. It is our own AS.

E. A route map has been applied to this route.

F. The BGP next hop is unreachable.

Answer: B



Which two orders in the BGP Best Path Selection process are correct? (Choose two.)

A. Higher local preference, then lowest MED, then eBGP over iBGP paths

B. Higher local preference, then highest weight, then lowest router ID

C. Highest weight, then higher local preference, then shortest AS path

D. Lowest origin type, then higher local preference, then lowest router ID

E. Highest weight, then higher local preference, then highest MED

Answer: A,C


CertBus exam braindumps are pass guaranteed. We guarantee your pass for the 400-101 exam successfully with our Cisco materials. CertBus CCIE Routing and Switching Written v5.0 exam PDF and VCE are the latest and most accurate. We have the best Cisco in our team to make sure CertBus CCIE Routing and Switching Written v5.0 exam questions and answers are the most valid. CertBus exam CCIE Routing and Switching Written v5.0 exam dumps will help you to be the Cisco specialist, clear your 400-101 exam and get the final success.

400-101 Latest questions and answers on Google Drive(100% Free Download):

400-101 Cisco exam dumps (100% Pass Guaranteed) from CertBus: [100% Exam Pass Guaranteed]

Why select/choose CertBus?

Millions of interested professionals can touch the destination of success in exams by products which would be available, affordable, updated and of really best quality to overcome the difficulties of any course outlines. Questions and Answers material is updated in highly outclass manner on regular basis and material is released periodically and is available in testing centers with whom we are maintaining our relationship to get latest material.

Brand Certbus Testking Pass4sure Actualtests Others
Price $45.99 $124.99 $125.99 $189 $69.99-99.99
Up-to-Date Dumps
Free 365 Days Update
Real Questions
Printable PDF
Test Engine
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back
Secure Payment
Privacy Protection

Be First to Comment

Leave a Reply