Sunday, August 7, 2016

2016NEW Cisco.CCIE.(400-101)EXAM] CCIE Routing and Switching EXAM A PART6 (101-120) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE

Do you want to pass the 400-101 Examsavior exam? What are the new questions of the latest 400-101 exam? Examsavior 400-101 VCE dumps and 400-101 PDF dumps will tell you all about the 400-101 Examsavior exam.Here are the Examsavior newest and covered all new added questions and answers, which will help you 100% passing  400-101 Examsavior exam.Hurry up and get the free exam from here!
NOW FREE DOWNLOAD
http://examsavior.com/70-414


QUESTION 101
Which three statements are true about VSS? (Choose three.)
A. VSS separates the control planes of the active and the standby chassis.
B. Configuration changes can be made on both active and standby chassis.
C. When the VSS active chassis recovers after a failure, it initiates a switchover and takes on the active role again.
D. VSS unifies the control planes of the active and the standby chassis.
E. HSRP configuration is not required to run VSS.
F. The VSS standby chassis monitors the VSS active chassis using the VSL.
Correct Answer: DEF
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
VSS operates on a unified control plane with a distributed forwarding architecture in which the active supervisor (or switch) is responsible for actively participating
with the rest of the network and for managing and maintaining control plane information.
VSS actually removes the need for a next-hop redundancy protocol like HSRP or VRRP. These first-hop redundancy protocols are usually heavily tied to a fastconverging
routing protocol like EIGRP, and still require that each device maintain its own control plane.
The standby chassis monitors the active chassis using the VSL. If it detects failure, the standby chassis initiates a switchover and takes on the active role. When
the failed chassis recovers, it takes on the standby role.Reference. http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15- 1SY/config_guide/sup2T/15_1_sy_swcg_2T/virtual_switching_systems.pdf
QUESTION 102
Which flag in a configuration BPDU instructs all switches to shorten their bridge table aging process from the default 300 seconds to the current forward delay
value?
A. topology change bit
B. topology change acknowledgment bit
C. priority bit
D. max-age bit
Correct Answer: A
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
The Root Bridge continues to set the Topology Change flag (TCN bit) in all Configuration BPDUs that it sends out for a total of Forward Delay + Max Age seconds
(default = 35 (20+15) seconds). This flag instructs all bridges to shorten their MAC address table (Bridge table) aging process from the default value of 300
seconds to the current Forward Delay value of the bridge (default=15 seconds).
The TCA flag is set by the upstream bridge to tell the downstream bridges to stop sending TCN BPDUs. The TC flag is set in configuration BPDU by the Root
Bridge to shorten the bridge table age-out period from default 300 seconds to Forward Delay seconds.
QUESTION 103
Refer to the exhibit.
2016NEW Cisco.CCIE.(400-101)EXAM] CCIE Routing and Switching EXAM A PART6 (101-120) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE
Which technology can be used on the switch to enable host A to receive multicast packets for 239.2.2.2 but prevent host B from receiving them?
A. IGMP filtering
B. MLD snooping
C. IGMP snooping
D. MLD filtering
Correct Answer: C
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
IGMP snooping is the process of listening to Internet Group Management Protocol (IGMP) network traffic. The feature allows a network switch to listen in on the
IGMP conversation between hosts and routers. By listening to these conversations the switch maintains a map of which links need which IP multicast streams.
Multicasts may be filtered from the links which do not need them and thus controls which ports receive specific multicast traffic.
QUESTION 104
Which option describes the purpose of the PPP endpoint discriminator?A. It identifies the maximum payload packet.
B. It notifies the peer that it prefers 12-bit sequence numbers.
C. It identifies the system attached to the link.
D. It determines whether a loopback is on the link.
Correct Answer: C
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
In situations in which many clients use the same username to initiate an MP connection, or when interoperating with non-Cisco routers, you need to control the
order in which the bundle name is created. It is necessary to configure the access server to create a bundle name based on the endpoint discriminator first, the
username second, or both. The endpoint discriminator identifies the system transmitting the packet and advises the network access server (NAS) that the peer on
this link could be the same as the peer on another existing link. Because every client has a unique endpoint discriminator, only multiple links from the same client
are bundled into a single unique MP connection. For example, consider when two PC clients initiate a multilink connection to an access server using the same
username. If the multilink bundle name is established based on the endpoint discriminator first, then on the username or on both, the NAS can accurately bundle
the links from each client using the endpoint discriminator as a bundle name. This bundle name is unique to the peer system transmitting the packet.
Reference. http://www.cisco.com/c/en/us/support/docs/wan/point-to-point-protocol-ppp/10238- mppp-bundle-name.html
QUESTION 105
Which three statements about SPAN traffic monitoring are true? (Choose three.)
A. Traffic from a non-source VLAN is discarded when it arrives on a source VLAN.
B. Multiple sessions can send traffic to an individual destination port.
C. It supports up to 32 SPAN ports per switch.
D. The destination port acts as a normal switchport.
E. It supports up to 64 SPAN ports per switch.
F. Only one session can send traffic to an individual destination port.
Correct Answer: AEF
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
You can create up to a total of 64 SPAN and ERSPAN sessions to define sources and destinations on the local device.You can also create a SPAN session tomonitor multiple VLAN sources and choose only VLANs of interest to transmit on multiple destination ports. For example, you can configure SPAN on a trunk port
and monitor traffic from different VLANs on different destination ports.
You can configure a particular destination port in only one SPAN session.
Traffic from a non-source VLAN is discarded when it arrives on a source VLAN.
Reference.
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus1000/sw/4_0/troubleshooting/confi guration/guide/n1000v_troubleshooting/trouble_15span.html
QUESTION 106
Which option describes how a VTPv3 device responds when it detects a VTPv2 device on a trunk port?
A. It sends VTPv3 packets only.
B. It sends VTPv2 packets only.
C. It sends VTPv3 and VTPv2 packets.
D. It sends a special packet that contains VTPv3 and VTPv2 packet information.
Correct Answer: C
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
When a VTP version 3 device on a trunk port receives messages from a VTP version 2 device, the VTP version 3 device sends a scaled-down version of the
VLAN database on that particular trunk in a VTP version 2 format. A VTP version 3 device does not send out VTP version 2-formatted packets on a trunk port
unless it first receives VTP version 2 packets on that trunk. If the VTP version 3 device does not receive VTP version 2 packets for an interval of time on the trunk
port, the VTP version 3 device stops transmitting VTP version 2 packets on that trunk port.
Even when a VTP version 3 device detects a VTP version 2 device on a trunk port, the VTP version 3 device continues to send VTP version 3 packets in addition
to VTP version 3 device 2 packets, to allow two kinds of neighbors to coexist on the trunk. VTP version 3 sends VTP version 3 and VTP version 2 updates on VTP
version 2-detected trunks.
Reference. http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12- 2SX/configuration/guide/book/vtp.html
QUESTION 107
Which three statements about bridge assurance are true? (Choose three.)
A. Bridge assurance must be enabled on both ends of a link.
B. Bridge assurance can be enabled on one end of a link or on both ends.
C. Bridge assurance is enabled on STP point-to-point links only.
D. Bridge assurance is enabled on STP multipoint links only.E. If a bridge assurance port fails to receive a BPDU after a timeout, the port is put into a blocking state.
F. If a bridge assurance port fails to receive a BPDU after a timeout, the port is put into an error disabled state.
Correct Answer: ACE
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
Bridge Assurance is enabled by default and can only be disabled globally. Also, Bridge Assurance can be enabled only on spanning tree network ports that are
point-to-point links. Finally, both ends of the link must have Bridge Assurance enabled.
With Bridge Assurance enabled, BPDUs are sent out on all operational network ports, including alternate and backup ports, for each hello time period. If the port
does not receive a BPDU for a specified period, the port moves into the blocking state and is not used in the root port calculation. Once that port receives a BPDU,
it resumes the normal spanning tree transitions.
Reference:
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5000/sw/configuration/guide/cli/C LIConfigurationGuide/SpanningEnhanced.html
QUESTION 108
What is the hop limit for an MLD message?
A. 1
B. 2
C. 15
D. 255
Correct Answer: A
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
MLD uses the Internet Control Message Protocol (ICMP) to carry its messages. All MLD messages are link-local with a hop limit of 1, and they all have the alert
option set. The alert option implies an implementation of the hop-by-hop option header.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipmulti_lsm/configuration/xe-3s/imc- lsm-xe-3s-book/ipv6-mcast-mld-xe.html
QUESTION 109
Refer to the exhibit.
2016NEW Cisco.CCIE.(400-101)EXAM] CCIE Routing and Switching EXAM A PART6 (101-120) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE
Which action must you take to enable the WAN link to function properly?
A. Enter a clock rate on the DCE interface.
B. Enter a clock rate on the DTE interface.
C. Enter a compression algorithm on both interfaces.
D. Configure both interfaces for HDLC encapsulation.
Correct Answer: A
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
When connecting a serial cable to the serial interface of the router, clocking is provided by an external device, such as a CSU/DSU device. A CSU/DSU (Channel
Service Unit/Data Service Unit) is a digital-interface device used to connect a router to a digital circuit. The router is the DTE (Data Terminal Equipment) and the
external device is the DCE (Data Communications Equipment), where the DCE provides the clocking. However, in some cases we might connect two routers
back- to-back using the routers’ serial interfaces (Example. Inside the router labs). Each router is a DTE by default.
Since clocking is required to enable the interface, one of the two routers should function as DCE and should provide clocking. This can be done by using the “clock
rate” command, from the interface configuration mode.
Reference. http://www.omnisecu.com/cisco-certified-network-associate-ccna/how-to-configure- router-serial-interfaces.php
QUESTION 110
Which two options are the two main phases of PPPoE? (Choose two.)
A. Active Discovery Phase
B. IKE Phase
C. Main Mode PhaseD. PPP Session Phase
E. Aggressive Mode Phase
F. Negotiation Phase
Correct Answer: AD
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
PPPoE is composed of two main phases:
Active Discovery Phase–In this phase, the PPPoE client locates a PPPoE server, called an access concentrator. During this phase, a Session ID is assigned and
the PPPoE layer is established.
PPP Session Phase–In this phase, PPP options are negotiated and authentication is performed. Once the link setup is completed, PPPoE functions as a Layer 2
encapsulation method, allowing data to be transferred over the PPP link within PPPoE headers.
Reference. http://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/vpn/asa-vpn- cli/vpn-pppoe.html
QUESTION 111
Which three statements about EVCs are true? (Choose three.)
A. Spanning Tree must use MST mode on EVC ports.
B. PAGP is supported on EVC ports.
C. Spanning Tree must use RSTP mode on EVC ports.
D. LACP is supported on EVC ports.
E. Layer 2 multicast framing is supported.
F. Bridge domain routing is required.
Correct Answer: ABD
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
EVC support requires the following:
– The spanning tree mode must be MST.
– The dot1ad global configuration mode command must be configured.These Layer 2 port-based features can run with EVC configured on a port:
– PAGP
– LACP
– UDLD
– LLDP
– CDP
– MSTP
Reference. http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12- 2SY/configuration/guide/sy_swcg/ethernet_virtual_connection.html
QUESTION 112
DRAG DROP
Drag and drop the LACP elements on the left into the correct priority order in the hot-standby port-selection process on the right.
Select and Place:
2016NEW Cisco.CCIE.(400-101)EXAM] CCIE Routing and Switching EXAM A PART6 (101-120) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE
Correct Answer:
2016NEW Cisco.CCIE.(400-101)EXAM] CCIE Routing and Switching EXAM A PART6 (101-120) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
QUESTION 113
Which statement about Cisco Discovery Protocol is true?
A. The multicast address 0100.0cdd.dddd is used as the destination address for periodic advertisements.
B. An inactive VLAN that is configured on an access port passes periodic Cisco Discovery Protocol advertisements.
C. The multicast address 0100.0ccc.ccd is used as the destination address for periodic advertisements.
D. A VLAN must be active on an access port before periodic Cisco Discovery Protocol advertisements are passed.
Correct Answer: D
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
All CDP packets include a VLAN ID. If you configure CDP on a Layer 2 access port, the CDP packets sent from that access port include the access port VLAN ID.
If you configure CDP on a Layer 2 trunk port, the CDP packets sent from that trunk port include the lowest configured VLAN ID allowed on that trunk port.
CDP messages on the active physical interfaces (Ethernet NIC) to a well-known multicast address (0100.0CCC.CCCC.
QUESTION 114Which three TLVs does LLDP use to discover network devices? (Choose three.)
A. Management address
B. Port description
C. Network policy
D. System name
E. Location information
F. Power management
Correct Answer: ABD
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
Basic Management TLV Set
This set includes the following five TLVs used in LLDP:
1. Port description TLV: Provides a description of the port in an alpha-numeric format. The value equals the ifDescr object, if the LAN device supports RFC 2863.
2. System name TLV: Provides the system’s assigned name in an alpha-numeric format. The value equals the sysName object, if the LAN device supports RFC
3418.
3. System description TLV: Provides a description of the network entity in an alpha-numeric format. This includes system’s name and versions of hardware,
operating system and networking software supported in the device. The value equals the sysDescr object, if the LAN device supports RFC 3418.
4. System capabilities TLV: Indicates the primary function(s) of the device and whether or not these functions are enabled in the device. The capabilities are
indicated by two octects. Bits 0 through 7 indicate Other, Repeater, Bridge, WLAN AP, Router, Telephone, DOCSIS cable device and Station respectively. Bits 8
through 15 are reserved.
5. Management address TLV: Indicates the addresses of the local LLDP agent. Other remote managers can use this address to obtain information related to the
local device.
Reference. http://www.eetimes.com/document.asp?doc_id=1272069
QUESTION 115
Which command enables L2 QoS support in all VLANs (including the native VLAN)?
A. switchport priority extend cos
B. mls qos trust dscp
C. mls qos rewrite ip dscp
D. switchport trunk native vlan tag
Correct Answer: DSection: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
You can enter the switchport trunk native vlan tag command to enable the tagging of native VLAN traffic on a per-port basis. When tagging is enabled, all the
packets on the native VLAN are tagged and all incoming untagged data packets are dropped, but untagged control packets are accepted. When tagging is
enabled, it will allow for L2 QoS support in all VLANs, including the native VLAN.
QUESTION 116
Which three modes are valid for forming an EtherChannel between the ports of two switches? (Choose three.)
A. Active/active
B. Active/passive
C. Passive/passive
D. Auto/auto
E. Auto/desirable
F. Desirable/on
Correct Answer: ABE
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
To configure an EtherChannel using LACP negotiation, each side must be set to either activeor passive; only interfaces configured in active mode will attempt to
negotiate an EtherChannel. Passive interfaces merely respond to LACP requests. PAgP behaves the same, but its two modes are refered to as desirable and
auto.
2016NEW Cisco.CCIE.(400-101)EXAM] CCIE Routing and Switching EXAM A PART6 (101-120) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE
Reference. http://packetlife.net/blog/2010/jan/18/etherchannel-considerations/
QUESTION 117
In which 802.1D port state are the root bridge, the root port, and the designated port(s) elected?
A. Listening
B. learning
C. forwarding
D. blocking
E. disabled
Correct Answer: A
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
STP switch port states:
Blocking – A port that would cause a switching loop if it were active. No user data is sent or received over a blocking port, but it may go into forwarding mode if
the other links in use fail and the spanning tree algorithm determines the port may transition to the forwarding state. BPDU data is still received in blocking
state. Prevents the use of looped paths.
Listening – The switch processes BPDUs and awaits possible new information that would cause it to return to the blocking state. It does not populate the MAC
address table and it does not forward frames. In this state the root bridge, the root port, and the designated port(s) are elected.
Learning – While the port does not yet forward frames it does learn source addresses from frames received and adds them to the filtering database (switching
database). It populates the MAC Address table, but does not forward frames.
Forwarding – A port receiving and sending data, normal operation. STP still monitors incoming BPDUs that would indicate it should return to the blocking state
to prevent a loop.
Disabled – Not strictly part of STP, a network administrator can manually disable a port.
Reference. http://en.wikipedia.org/wiki/Spanning_Tree_Protocol
QUESTION 118
In a network where a Layer 2 switch interconnects several routers, which feature restricts multicast packets for each IP multicast group to only those mulicast
router ports that have downstream receivers joined to that group?
A. PIM snooping
B. IGMP snooping
C. IGMP filterD. IGMP proxy
Correct Answer: A
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
In networks where a Layer 2 switch interconnects several routers, such as an Internet exchange point (IXP), the switch floods IP multicast packets on all multicast
router ports by default, even if there are no multicast receivers downstream. With PIM snooping enabled, the switch restricts multicast packets for each IP
multicast group to only those multicast router ports that have downstream receivers joined to that group. When you enable PIM snooping, the switch learns which
multicast router ports need to receive the multicast traffic within a specific VLAN by listening to the PIM hello messages, PIM join and prune messages, and
bidirectional PIM designated forwarder-election messages.
Reference. http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12- 2SX/configuration/guide/book/snooppim.html
QUESTION 119
Which three statements about Cisco HDLC are true? (Choose three.)
A. HDLC serial encapsulation provides asynchronous framing and error detection.
B. Serial link keepalives are maintained by SLARP.
C. HDLC serial encapsulation provides synchronous framing without retransmission.
D. HDLC frame size can be reduced with MPPC compression.
E. The interface is brought down after five ignored keepalives.
F. The interface is brought down after three ignored keepalives.
Correct Answer: BCF
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
Cisco High-Level Data Link Controller (HDLC) is the Cisco proprietary protocol for sending data over synchronous serial links using HDLC. Cisco HDLC also
provides a simple control protocol called Serial Line Address Resolution Protocol (SLARP) to maintain serial link keepalives. For each encapsulation type, a
certain number of keepalives ignored by a peer triggers the serial interface to transition to the down state. For HDLC encapsulation, three ignored keepalives
causes the interface to be brought down.
By default, synchronous serial lines use the High-Level Data Link Control (HDLC) serial encapsulation method, which provides the synchronous framing and error
detection functions of HDLC without windowing or retransmission.
Reference.http://www.cisco.com/c/en/us/td/docs/routers/access/800/819/software/configuration/Guide/819_S CG/6ser_conf.html#78662
QUESTION 120
Which two fields reside in the initial CHAP challenge packet? (Choose two.)
A. the authentication name of the challenger
B. a random hash value generated by the device
C. the hashed packet type ID
D. the packet type ID in clear text
Correct Answer: AD
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
When a caller A dials in to an access server B, The Access server sends across the link an initial Type 1 authentication packet called a Challenge. This Challenge
packet contains a randomly generated number, an ID sequence number to identify the challenge (sent in clear text) and the authentication name of the challenger.
Reference. http://www.rhyshaden.com/ppp.htm





Latest online browsing the 400-101 exam!
400-101 PDF dumps & 400-101 VCE dumps: http://examsavior.com/400-101
 ESTKPSATOB
 
Test King
Pass4sure
Actual Tests
Other Brands
Customer Reviews5stars1star1star1star1star
 
$89.99
$124.99
$125.99
$189.00
$29.99~$49.99
Up-To-DatedAvailableNotAvailableNotAvailableNotAvailableNotAvailable
Real Questions & AnswersAvailableNotAvailableNotAvailableNotAvailableNotAvailable
Correct All ErrorAvailableNotAvailableNotAvailableNotAvailableNotAvailable
Premium VCE DumpsAvailableNotAvailableNotAvailableNotAvailableNotAvailable
Free VCE SimulatorAvailableNotAvailableNotAvailableNotAvailableNotAvailable
Unlimited After One Time PurchasingAvailableNotAvailableNotAvailableNotAvailableNotAvailable
Instant DownloadAvailableNotAvailableNotAvailableNotAvailableNotAvailable
Printable PDF DumpsAvailableNotAvailableNotAvailableNotAvailableNotAvailable
100% Pass GuaranteeAvailableNotAvailableNotAvailableNotAvailableNotAvailable
100% Money BackAvailableNotAvailableNotAvailableNotAvailableNotAvailable

No comments:

Post a Comment