CertBus 2018 Latest Cisco 400-101 CCIE Exam VCE and PDF Dumps for Free Download!
☆ 400-101 CCIE Exam PDF and VCE Dumps : 1436QAs Instant Download: https://www.certbus.com/400-101.html [100% 400-101 Exam Pass Guaranteed or Money Refund!!]
☆ Free view online pdf on CertBus free test 400-101 PDF: https://www.certbus.com/online-pdf/400-101.pdf
☆ CertBus 2018 Latest 400-101 CCIE exam Question PDF Free Download from Google Drive Share: https://drive.google.com/file/d/0B_3QX8HGRR1mdEpkTFZvSDJDc2c/view?usp=sharing
Following 400-101 1436QAs are all new published by Cisco Official Exam Center
This is a note. Please give me your attention if you are preparing for your Cisco Nov 15,2018 Hotest 400-101 exam questions exam. It is really a tough task to pass CCIE Latest 400-101 practice exam. However, CertBus will help you on that with the most comprehensive PDF and VCEs of the latest CCIE Hotest 400-101 pdf exam questions, covering each and every aspect of CCIE Newest 400-101 pdf dumps CCIE Routing and Switching Written v5.0 exam curriculum.
try CertBus free demo of 400-101 exams and so on. CertBus | lead to pass 400-101 certification exams. first test, first pass! CertBus – any 400-101 exam, 400-101 easy pass. CertBus it exam study material and real exam questions and answers help you pass 400-101 exams and get 400-101 certifications easily. CertBus – clear all your 400-101 certification exams with CertBus study guide. 100% pass rate and money back guarantee.
We CertBus has our own expert team. They selected and published the latest 400-101 preparation materials from Cisco Official Exam-Center: https://www.certbus.com/400-101.html
Which two commands are required to enable multicast on a router, knowing that the receivers only
support IGMPv2? (Choose two.)
A. ip pim rp-address
B. ip pim ssm
C. ip pim sparse-mode
D. ip pim passive
Sparse mode logic (pull mode) is the opposite of Dense mode logic (push mode), in Dense mode
it is supposed that in every network there is someone who is requesting the multicast traffic so
PIM-DM routers begin by flooding the multicast traffic out of all their interfaces except those from
where a prune message is received to eliminate the
A new backup connection is being deployed on a remote site router. The stability of the connection
has been a concern. In order to provide more information to EIGRP regarding this interface, you
wish to incorporate the “reliability” cost metric in the EIGRP calculation with the command metric
weights 1 0 1 0 1.
What impact will this modification on the remote site router have for other existing EIGRP
neighborships from the same EIGRP domain?
A. Existing neighbors will immediately begin using the new metric.
B. Existing neighbors will use the new metric after clearing the EIGRP neighbors.
C. Existing neighbors will resync, maintaining the neighbor relationship.
D. All existing neighbor relationships will go down.
Refer to the exhibit.
A small enterprise connects its office to two ISPs, using separate T1 links. A static route is used
for the default route, pointing to both interfaces with a different administrative distance, so that one
of the default routes is preferred.
Recently the primary link has been upgraded to a new 10 Mb/s Ethernet link.
After a few weeks, they experienced a failure. The link did not pass traffic, but the primary static
route remained active. They lost their Internet connectivity, even though the backup link was
Which two possible solutions can be implemented to avoid this situation in the future? (Choose
A. Implement HSRP link tracking on the branch router R1.
B. Use a track object with an IP SLA probe for the static route on R1.
C. Track the link state of the Ethernet link using a track object on R1.
D. Use a routing protocol between R1 and the upstream ISP.
Interface tracking allows you to specify another interface on the router for the HSRP process to
monitor in order to alter the HSRP priority for a given group.
If the specified interface\’s line protocol goes down, the HSRP priority of this router is reduced,
allowing another HSRP router with higher priority can become active (if it has preemption
To configure HSRP interface tracking, use the standby [group] track interface [priority] command.
When multiple tracked interfaces are down, the priority is reduced by a cumulative amount. If you
explicitly set the decrement value, then the value is decreased by that amount if that interface is
down, and decrements are cumulative. If you do not set an explicit decrement value, then the
value is decreased by 10 for each interface that goes down, and decrements are cumulative.
The following example uses the following configuration, with the default decrement value of 10.
Note: When an HSRP group number is not specified, the default group number is group 0.
ip address 10.1.1.1 255.255.255.0
standby ip 10.1.1.3
standby priority 110
standby track serial0
standby track serial1
The HSRP behavior with this configuration is:
0 interfaces down = no decrease (priority is 110)
1 interface down = decrease by 10 (priority becomes100)
2 interfaces down = decrease by 10 (priority becomes 90)
Why would a rogue host that is running a DHCP server on a campus LAN network present a
A. It may allocate IP addresses from an unknown subnet to the users.
B. All multicast traffic can be sniffed by using the DHCP multicast capabilities.
C. The CPU utilization of the first hop router can be overloaded by exploiting DHCP relay open
D. A potential man-in-the-middle attack can be used against the clients.
Which statement is true about loop guard?
A. Loop guard only operates on interfaces that are considered point-to-point by the spanning tree.
B. Loop guard only operates on root ports.
C. Loop guard only operates on designated ports.
D. Loop guard only operates on edge ports.
Understanding How Loop Guard Works
Unidirectional link failures may cause a root port or alternate port to become designated as root if
BPDUs are absent. Some software failures may introduce temporary loops in the network. Loop
guard checks if a root port or an alternate root port receives BPDUs. If the port is receiving
BPDUs, loop guard puts the port into an inconsistent state until it starts receiving BPDUs again.
Loop guard isolates the failure and lets spanning tree converge to a stable topology without the
failed link or bridge.
You can enable loop guard per port with the set spantree guard loop command.
Note When you are in MST mode, you can set all the ports on a switch with the set spantree
global-defaults loop-guard command.
When you enable loop guard, it is automatically applied to all of the active instances or VLANs to
which that port belongs. When you disable loop guard, it is disabled for the specified ports.
Disabling loop guard moves all loop-inconsistent ports to the listening state.
If you enable loop guard on a channel and the first link becomes unidirectional, loop guard blocks
the entire channel until the affected port is removed from the channel. Figure 8-6 shows loop
guard in a triangle switch configuration.
Figure 8-6 Triangle Switch Configuration with Loop Guard
Figure 8-6 illustrates the following configuration:
Switches A and B are distribution switches.
Switch C is an access switch.
Loop guard is enabled on ports 3/1 and 3/2 on Switches A, B, and C.
Use loop guard only in topologies where there are blocked ports. Topologies that have no blocked
ports, which are loop free, do not need to enable this feature. Enabling loop guard on a root switch
has no effect but provides protection when a root switch becomes a nonroot switch.
Follow these guidelines when using loop guard:
Do not enable loop guard on PortFast-enabled or dynamic VLAN ports.
Do not enable PortFast on loop guard-enabled ports.
Do not enable loop guard if root guard is enabled.
Do not enable loop guard on ports that are connected to a shared link.
Note: We recommend that you enable loop guard on root ports and alternate root ports on access
Loop guard interacts with other features as follows:
Loop guard does not affect the functionality of UplinkFast or BackboneFast.
Root guard forces a port to always be designated as the root port. Loop guard is effective only if
the port is a root port or an alternate port. Do not enable loop guard and root guard on a port at the
PortFast transitions a port into a forwarding state immediately when a link is established. Because
a PortFast-enabled port will not be a root port or alternate port, loop guard and PortFast cannot be
configured on the same port. Assigning dynamic VLAN membership for the port requires that the
port is PortFast enabled. Do not configure a loop guard-enabled port with dynamic VLAN
If your network has a type-inconsistent port or a PVID-inconsistent port, all BPDUs are dropped
until the misconfiguration is corrected. The port transitions out of the inconsistent state after the
message age expires. Loop guard ignores the message age expiration on type-inconsistent ports
and PVID-inconsistent ports. If the port is already blocked by loop guard, misconfigured BPDUs
that are received on the port make loop guard recover, but the port is moved into the type-
inconsistent state or PVID-inconsistent state.
In high-availability switch configurations, if a port is put into the blocked state by loop guard, it
remains blocked even after a switchover to the redundant supervisor engine. The newly activated
supervisor engine recovers the port only after receiving a BPDU on that port.
Loop guard uses the ports known to spanning tree. Loop guard can take advantage of logical ports
provided by the Port Aggregation Protocol (PAgP). However, to form a channel, all the physical
ports grouped in the channel must have compatible configurations. PAgP enforces uniform
configurations of root guard or loop guard on all the physical ports to form a channel.
These caveats apply to loop guard:
When you are troubleshooting duplex mismatches, which two errors are typically seen on the full-
duplex end? (Choose two.)
B. FCS errors
C. interface resets
D. late collisions
Which three options are features of VTP version 3? (Choose three.)
A. VTPv3 supports 8K VLANs.
B. VTPv3 supports private VLAN mapping.
C. VTPv3 allows for domain discovery.
D. VTPv3 uses a primary server concept to avoid configuration revision issues.
E. VTPv3 is not compatible with VTPv1 or VTPv2.
F. VTPv3 has a hidden password option.
Key Benefits of VTP Version 3
Much work has gone into improving the usability of VTP version 3 in three major areas:
The new version of VTP offers better administrative control over which device is allowed to update
other devices\’ view of the VLAN topology. The chance of unintended and disruptive changes is
significantly reduced, and availability is increased. The reduced risk of unintended changes will
ease the change process and help speed deployment.
Functionality for the VLAN environment has been significantly expanded. Two enhancements are
most beneficial for today\’s networks:
Which three options are considered in the spanning-tree decision process? (Choose three.)
A. lowest root bridge ID
B. lowest path cost to root bridge
C. lowest sender bridge ID
D. highest port ID
E. highest root bridge ID
F. highest path cost to root bridge
Configuration bridge protocol data units (BPDUs) are sent between switches for each port.
Switches use s four step process to save a copy of the best BPDU seen on every port. When a
port receives a better BPDU, it stops sending them. If the BPDUs stop arriving for 20 seconds
(default), it begins sending them again.
Step 1 Lowest Root Bridge ID (BID)
Step 2 Lowest Path Cost to Root Bridge
Step 3 Lowest Sender BID
Step 4 Lowest Port ID
Cisco General Networking Theory Quick Reference Sheets
In 802.1s, how is the VLAN to instance mapping represented in the BPDU?
A. The VLAN to instance mapping is a normal 16-byte field in the MST BPDU.
B. The VLAN to instance mapping is a normal 12-byte field in the MST BPDU.
C. The VLAN to instance mapping is a 16-byte MD5 signature field in the MST BPDU.
D. The VLAN to instance mapping is a 12-byte MD5 signature field in the MST BPDU.
MST Configuration and MST Region
Each switch running MST in the network has a single MST configuration that consists of these
1. An alphanumeric configuration name (32 bytes)
2. A configuration revision number (two bytes)
3. A 4096-element table that associates each of the potential 4096 VLANs supported on the
chassis to a given instance.
In order to be part of a common MST region, a group of switches must share the same
It is up to the network administrator to properly propagate the configuration throughout the region.
Currently, this step is only possible by the means of the command line interface (CLI) or through
Management Protocol (SNMP). Other methods can be envisioned, as the IEEE specification does
not explicitly mention how to accomplish that step.
Note: If for any reason two switches differ on one or more configuration attribute, the switches are
part of different regions. For more information refer to the Region Boundary section of this
In order to ensure consistent VLAN-to-instance mapping, it is necessary for the protocol to be able
to exactly identify the boundaries of the regions. For that purpose, the characteristics of the region
are included in the BPDUs. The exact VLANs-to-instance mapping is not propagated in the BPDU,
because the switches only need to know whether they are in the same region as a neighbor.
Therefore, only a digest of the VLANs-toinstance mapping table is sent, along with the revision
number and the name. Once a switch receives a BPDU, the switch extracts the digest (a
numerical value derived from the VLAN-to-instance mapping table through a mathematical
function) and compares this digest with its own computed digest. If the digests differ, the port on
which the BPDU was received is at the boundary of a region.
In generic terms, a port is at the boundary of a region if the designated bridge on its segment is in
a different region or if it receives legacy 802.1d BPDUs. In this diagram, the port on B1 is at the
boundary of region A, whereas the ports on B2 and B3 are internal to region B:
According to the IEEE 802.1s specification, an MST bridge must be able to handle at least these
One Internal Spanning Tree (IST)
One or more Multiple Spanning Tree Instance(s) (MSTIs)
The terminology continues to evolve, as 802.1s is actually in a pre-standard phase. It is likely
these names will change in the final release of 802.1s. The Cisco implementation supports 16
instances: one IST (instance 0) and 15 MSTIs.
show vtp status
Cisco switches “show vtp status” Field Descriptions has a MD5 digest field that is a 16-byte
checksum of the
VTP configuration as shown below
Router# show vtp status
VTP Version: 3 (capable)
Configuration Revision: 1
Maximum VLANs supported locally: 1005
Number of existing VLANs: 37
VTP Operating Mode: Server
VTP Domain Name: [smartports]
VTP Pruning Mode: Disabled
VTP V2 Mode: Enabled
VTP Traps Generation: Disabled
MD5 digest : 0x26 0xEE 0x0D 0x84 0x73 0x0E 0x1B 0x69
Configuration last modified by 172.20.52.19 at 7-25-08 14:33:43
Local updater ID is 172.20.52.19 on interface Gi5/2 (first layer3 interface fou)
VTP version running: 2
Which two options does Cisco PfR use to control the entrance link selection with inbound
optimization? (Choose two.)
A. Prepend extra AS hops to the BGP prefix.
B. Advertise more specific BGP prefixes (longer mask).
C. Add (prepend) one or more communities to the prefix that is advertised by BGP.
D. Have BGP dampen the prefix.
Explanation: PfR Entrance Link Selection Control Techniques
The PfR BGP inbound optimization feature introduced the ability to influence inbound traffic. A
network advertises reachability of its inside prefixes to the Internet using eBGP advertisements to
its ISPs. If the same prefix is advertised to more than one ISP, then the network is multihoming.
PfR BGP inbound optimization works best with multihomed networks, but it can also be used with
a network that has multiple connections to the same ISP. To implement BGP inbound
optimization, PfR manipulates eBGP advertisements to influence the best entrance selection for
traffic bound for inside prefixes. The benefit of implementing the best entrance selection is limited
to a network that has more than one ISP connection.
To enforce an entrance link selection, PfR offers the following methods:
BGP Autonomous System Number Prepend When an entrance link goes out-of-policy (OOP) due
to delay, or in images prior to Cisco IOS Releases 15.2(1) T1 and 15.1(2)S, and PfR selects a
best entrance for an inside prefix, extra autonomous system hops are prepended one at a time (up
to a maximum of six) to the inside prefix BGP advertisement over the other entrances. In Cisco
IOS Releases 15.2(1)T1, 15.1(2)S, and later releases, when an entrance link goes out-of policy
(OOP) due to unreachable or loss reasons, and PfR selects a best entrance for an inside prefix,
six extra autonomous system hops are prepended immediately to the inside prefix BGP
advertisement over the other entrances. The extra autonomous system hops on the other
entrances increase the probability that the best entrance will be used for the inside prefix. When
the entrance link is OOP due to unreachable or loss reasons, six extra autonomous system hops
are added immediately to allow the software to quickly move the traffic away from the old entrance
link. This is the default method PfR uses to control an inside prefix, and no user configuration is
BGP Autonomous System Number Community Prepend
When an entrance link goes out-of-policy (OOP) due to delay, or in images prior to Cisco IOS
(1)T1 and 15.1(2)S, and PfR selects a best entrance for an inside prefix, a BGP prepend
community is attached one at a time (up to a maximum of six) to the inside prefix BGP
advertisement from the network to another autonomous system such as an ISP. In Cisco IOS
Releases 15.2(1)T1, 15.1(2)S, and later releases, when an entrance link goes out-of-policy (OOP)
due to unreachable or loss reasons, and PfR selects a best entrance for an inside prefix, six BGP
prepend communities are attached to the inside prefix BGP advertisement. The BGP prepend
community will increase the number of autonomous system hops in the advertisement of the
inside prefix from the ISP to its peers. Autonomous system prepend BGP community is the
preferred method to be used for PfR BGP inbound optimization because there is no risk of the
local ISP filtering the extra autonomous system hops. There are some issues, for example, not all
ISPs support the BGP prepend community, ISP policies may ignore or modify the autonomous
system hops, and a transit ISP may filter the autonomous system path. If you use this method of
inbound optimization and a change is made to an autonomous system, you must issue an
outbound reconfiguration using the “clear ip bgp” command.
CertBus exam braindumps are pass guaranteed. We guarantee your pass for the 400-101 exam successfully with our Cisco materials. CertBus CCIE Routing and Switching Written v5.0 exam PDF and VCE are the latest and most accurate. We have the best Cisco in our team to make sure CertBus CCIE Routing and Switching Written v5.0 exam questions and answers are the most valid. CertBus exam CCIE Routing and Switching Written v5.0 exam dumps will help you to be the Cisco specialist, clear your 400-101 exam and get the final success.
400-101 Latest questions and answers on Google Drive(100% Free Download): https://drive.google.com/file/d/0B_3QX8HGRR1mdEpkTFZvSDJDc2c/view?usp=sharing
400-101 Cisco exam dumps (100% Pass Guaranteed) from CertBus: https://www.certbus.com/400-101.html [100% Exam Pass Guaranteed]
Why select/choose CertBus?
Millions of interested professionals can touch the destination of success in exams by certbus.com. products which would be available, affordable, updated and of really best quality to overcome the difficulties of any course outlines. Questions and Answers material is updated in highly outclass manner on regular basis and material is released periodically and is available in testing centers with whom we are maintaining our relationship to get latest material.