CertBus 2018 Real Cisco 400-101 CCIE Exam VCE and PDF Dumps for Free Download!
☆ 400-101 CCIE Exam PDF and VCE Dumps : 1436QAs Instant Download: https://www.certbus.com/400-101.html [100% 400-101 Exam Pass Guaranteed or Money Refund!!]
☆ Free view online pdf on CertBus free test 400-101 PDF: https://www.certbus.com/online-pdf/400-101.pdf
☆ CertBus 2018 Real 400-101 CCIE exam Question PDF Free Download from Google Drive Share: https://drive.google.com/file/d/0B_3QX8HGRR1mdEpkTFZvSDJDc2c/view?usp=sharing
Following 400-101 1436QAs are all new published by Cisco Official Exam Center
CCIE Oct 25,2018 Hotest 400-101 practice easy pass guidance: Preparing for Cisco CCIE Hotest 400-101 vce dumps exam is really a tough task to achieve. However, CertBus provides the most comprehensive PDF and VCEs, covering each knowledge points required in the actual Hotest 400-101 study guide exam.
CertBus- reliable 400-101 certifications expert on 400-101 exam study guide providing. CertBus – 400-101 certification with money back assurance. CertBus certification 400-101 practice exams. CertBus – help candidates on all 400-101 certification exams preparation. pass 400-101 certification exams, get it certifications easily.
We CertBus has our own expert team. They selected and published the latest 400-101 preparation materials from Cisco Official Exam-Center: https://www.certbus.com/400-101.html
Which two commands are required to enable multicast on a router, knowing that the receivers only
support IGMPv2? (Choose two.)
A. ip pim rp-address
B. ip pim ssm
C. ip pim sparse-mode
D. ip pim passive
Sparse mode logic (pull mode) is the opposite of Dense mode logic (push mode), in Dense mode
it is supposed that in every network there is someone who is requesting the multicast traffic so
PIM-DM routers begin by flooding the multicast traffic out of all their interfaces except those from
where a prune message is received to eliminate the
Refer to the exhibit.
A small enterprise connects its office to two ISPs, using separate T1 links. A static route is used
for the default route, pointing to both interfaces with a different administrative distance, so that one
of the default routes is preferred.
Recently the primary link has been upgraded to a new 10 Mb/s Ethernet link.
After a few weeks, they experienced a failure. The link did not pass traffic, but the primary static
route remained active. They lost their Internet connectivity, even though the backup link was
Which two possible solutions can be implemented to avoid this situation in the future? (Choose
A. Implement HSRP link tracking on the branch router R1.
B. Use a track object with an IP SLA probe for the static route on R1.
C. Track the link state of the Ethernet link using a track object on R1.
D. Use a routing protocol between R1 and the upstream ISP.
Interface tracking allows you to specify another interface on the router for the HSRP process to
monitor in order to alter the HSRP priority for a given group.
If the specified interface\’s line protocol goes down, the HSRP priority of this router is reduced,
allowing another HSRP router with higher priority can become active (if it has preemption
To configure HSRP interface tracking, use the standby [group] track interface [priority] command.
When multiple tracked interfaces are down, the priority is reduced by a cumulative amount. If you
explicitly set the decrement value, then the value is decreased by that amount if that interface is
down, and decrements are cumulative. If you do not set an explicit decrement value, then the
value is decreased by 10 for each interface that goes down, and decrements are cumulative.
The following example uses the following configuration, with the default decrement value of 10.
Note: When an HSRP group number is not specified, the default group number is group 0.
ip address 10.1.1.1 255.255.255.0
standby ip 10.1.1.3
standby priority 110
standby track serial0
standby track serial1
The HSRP behavior with this configuration is:
0 interfaces down = no decrease (priority is 110)
1 interface down = decrease by 10 (priority becomes100)
2 interfaces down = decrease by 10 (priority becomes 90)
Why would a rogue host that is running a DHCP server on a campus LAN network present a
A. It may allocate IP addresses from an unknown subnet to the users.
B. All multicast traffic can be sniffed by using the DHCP multicast capabilities.
C. The CPU utilization of the first hop router can be overloaded by exploiting DHCP relay open
D. A potential man-in-the-middle attack can be used against the clients.
Which statement is true about TCN propagation?
A. The originator of the TCN immediately floods this information through the network.
B. The TCN propagation is a two step process.
C. A TCN is generated and sent to the root bridge.
D. The root bridge must flood this information throughout the network.
New Topology Change Mechanisms
When an 802.1D bridge detects a topology change, it uses a reliable mechanism to first notify the
This is shown in this diagram:
Once the root bridge is aware of a change in the topology of the network, it sets the TC flag on the
BPDUs it sends out, which are then relayed to all the bridges in the network. When a bridge
receives a BPDU with the TC flag bit set, it reduces its bridging-table aging time to forward delay
seconds. This ensures a relatively quick flush of stale information. Refer to Understanding
Spanning-Tree Protocol Topology Changes for more information on this process. This topology
change mechanism is deeply remodeled in RSTP. Both the detection of a topology change and its
propagation through the network evolve.
Topology Change Detection
In RSTP, only non-edge ports that move to the forwarding state cause a topology change. This
means that a loss of connectivity is not considered as a topology change any more, contrary to
802.1D (that is, a port that moves to blocking no longer generates a TC). When a RSTP bridge
detects a topology change, these occur:
It starts the TC While timer with a value equal to twice the hello-time for all its non-edge
designated ports and its root port, if necessary.
It flushes the MAC addresses associated with all these ports.
Note: As long as the TC While timer runs on a port, the BPDUs sent out of that port have the TC
BPDUs are also sent on the root port while the timer is active.
Topology Change Propagation
When a bridge receives a BPDU with the TC bit set from a neighbor, these occur:
It clears the MAC addresses learned on all its ports, except the one that receives the topology
It starts the TC While timer and sends BPDUs with TC set on all its designated ports and root port
(RSTP no longer uses the specific TCN BPDU, unless a legacy bridge needs to be notified).
This way, the TCN floods very quickly across the whole network. The TC propagation is now a one
step process. In fact, the initiator of the topology change floods this information throughout the
network, as opposed to 802.1D where only the root did. This mechanism is much faster than the
802.1D equivalent. There is no need to wait for the root bridge to be notified and then maintain the
topology change state for the whole network for seconds.
In just a few seconds, or a small multiple of hello-times, most of the entries in the CAM tables of
the entire network (VLAN) flush. This approach results in potentially more temporary flooding, but
on the other hand it clears potential stale information that prevents rapid connectivity restitution.
When you are troubleshooting duplex mismatches, which two errors are typically seen on the full-
duplex end? (Choose two.)
B. FCS errors
C. interface resets
D. late collisions
Which two options are contained in a VTP subset advertisement? (Choose two.)
A. followers field
B. MD5 digest
C. VLAN information
D. sequence number
When you add, delete, or change a VLAN in a Catalyst, the server Catalyst where the changes are
made increments the configuration revision and issues a summary advertisement. One or several
subset advertisements follow the summary advertisement. A subset advertisement contains a list
of VLAN information.
If there are several VLANs, more than one subset advertisement can be required in order to
advertise all the VLANs.
Subset Advertisement Packet Format
This formatted example shows that each VLAN information field contains information for a different
VLAN. It is ordered so that lowered-valued ISL VLAN IDs occur first:
Most of the fields in this packet are easy to understand. These are two clarifications:
Which three options are features of VTP version 3? (Choose three.)
A. VTPv3 supports 8K VLANs.
B. VTPv3 supports private VLAN mapping.
C. VTPv3 allows for domain discovery.
D. VTPv3 uses a primary server concept to avoid configuration revision issues.
E. VTPv3 is not compatible with VTPv1 or VTPv2.
F. VTPv3 has a hidden password option.
Key Benefits of VTP Version 3
Much work has gone into improving the usability of VTP version 3 in three major areas:
The new version of VTP offers better administrative control over which device is allowed to update
other devices\’ view of the VLAN topology. The chance of unintended and disruptive changes is
significantly reduced, and availability is increased. The reduced risk of unintended changes will
ease the change process and help speed deployment.
Functionality for the VLAN environment has been significantly expanded. Two enhancements are
most beneficial for today\’s networks:
Which three options are considered in the spanning-tree decision process? (Choose three.)
A. lowest root bridge ID
B. lowest path cost to root bridge
C. lowest sender bridge ID
D. highest port ID
E. highest root bridge ID
F. highest path cost to root bridge
Configuration bridge protocol data units (BPDUs) are sent between switches for each port.
Switches use s four step process to save a copy of the best BPDU seen on every port. When a
port receives a better BPDU, it stops sending them. If the BPDUs stop arriving for 20 seconds
(default), it begins sending them again.
Step 1 Lowest Root Bridge ID (BID)
Step 2 Lowest Path Cost to Root Bridge
Step 3 Lowest Sender BID
Step 4 Lowest Port ID
Cisco General Networking Theory Quick Reference Sheets
Refer to the exhibit.
Which statement is correct about the prefix 188.8.131.52/8?
A. The prefix has encountered a routing loop.
B. The prefix is an aggregate with an as-set.
C. The prefix has been aggregated twice, once in AS 100 and once in AS 200.
D. None of these statements is true.
Refer to the exhibit.
After a link flap in the network, which two EIGRP neighbors will not be queried for alternative
paths? (Choose two.)
Both 192.168.3.7 and 192.168.3.8 are in an EIGRP Stub area
The Enhanced Interior Gateway Routing Protocol (EIGRP) Stub Routing feature improves network
stability, reduces resource utilization, and simplifies stub router configuration.
Stub routing is commonly used in a hub and spoke network topology. In a hub and spoke network,
one or more end (stub) networks are connected to a remote router (the spoke) that is connected to
one or more distribution routers (the hub). The remote router is adjacent only to one or more
distribution routers. The only route for IP traffic to follow into the remote router is through a
distribution router. This type of configuration is commonly used in WAN topologies where the
distribution router is directly connected to a WAN. The distribution router can be connected to
many more remote routers. Often, the distribution router will be connected to 100 or more remote
routers. In a hub and spoke topology, the remote router must forward all nonlocal traffic to a
distribution router, so it becomes unnecessary for the remote router to hold a complete routing
table. Generally, the distribution router need not send anything more than a default route to the
When using the EIGRP Stub Routing feature, you need to configure the distribution and remote
routers to use EIGRP, and to configure only the remote router as a stub. Only specified routes are
propagated from the remote (stub) router. The router responds to queries for summaries,
connected routes, redistributed static routes, external routes, and internal routes with the message
“inaccessible.” A router that is configured as a stub will send a special peer information packet to
all neighboring routers to report its status as a stub router. Any neighbor that receives a packet
informing it of the stub status will not query the stub router for any routes, and a router that has a
stub peer will not query that peer. The stub router will depend on the distribution router to send the
proper updates to all peers.
CertBus exam braindumps are pass guaranteed. We guarantee your pass for the 400-101 exam successfully with our Cisco materials. CertBus CCIE Routing and Switching Written v5.0 exam PDF and VCE are the latest and most accurate. We have the best Cisco in our team to make sure CertBus CCIE Routing and Switching Written v5.0 exam questions and answers are the most valid. CertBus exam CCIE Routing and Switching Written v5.0 exam dumps will help you to be the Cisco specialist, clear your 400-101 exam and get the final success.
400-101 Latest questions and answers on Google Drive(100% Free Download): https://drive.google.com/file/d/0B_3QX8HGRR1mdEpkTFZvSDJDc2c/view?usp=sharing
400-101 Cisco exam dumps (100% Pass Guaranteed) from CertBus: https://www.certbus.com/400-101.html [100% Exam Pass Guaranteed]
Why select/choose CertBus?
Millions of interested professionals can touch the destination of success in exams by certbus.com. products which would be available, affordable, updated and of really best quality to overcome the difficulties of any course outlines. Questions and Answers material is updated in highly outclass manner on regular basis and material is released periodically and is available in testing centers with whom we are maintaining our relationship to get latest material.