[2017 New] Free Lead2pass Cisco 400-201 Exam Questions Download (121-140)

2017 August Cisco Official New Released 400-201 Dumps in Lead2pass.com!

100% Free Download! 100% Pass Guaranteed!

We Lead2pass.com are providing 400-201 exam braindumps here in both PDF file and Online Practice Test Formats. The 400-201 dumps are updated time to time having all the questions answers which cover complete course outlines of the 400-201 certification exam.

Following questions and answers are all new published by Cisco Official Exam Center: https://www.lead2pass.com/400-201.html

Where are MPLS point-to-multipoint traffic engineering packets replicated?

A.    head-end router
B.    branch-point router
C.    midpoint router
D.    leaf-point router
E.    tail-end router

Answer: B

What are the two benefits of graceful restart? (Choose two)

A.    Graceful restart allows session information recovery without disruption to the network.
B.    A node can perform a graceful restart to help a neighbor recover its state. The label bindings are kept on state information, which helps the failed node recover faster and does not affect the current forward traffic.
C.    Graceful restart allows a node to recover state from its neighbor when there is no RP or before the device undergoes SSO.
D.    Graceful restart does not allow session information recovery.
E.    During a graceful restart, the router removes any stale prefixes after a timer for stale entries expires

Answer: AB

A network engineer needs to connect two core switches that use Gigabit Ethernet interfaces in an MPLS backbone and that are separated by a distance of 60 km.
Which Cisco GBIC achieves this goal?

A.    Cisco 1000BASE-T GBIC
B.    Cisco 1000BASE-SX GBIC
C.    Cisco 1000BASE-LX/LH GBIC
D.    Cisco 1000BASE-ZX GBIC

Answer: D

Refer to the exhibit. A customer is running IS-IS within a network and is using BGP as a CE-PE routing protocol. Which action allows CE1 to get the subnet over the CE1-PE1 link, regardless of whether there is a flap in the MPLS link or backdoor link?


A.    Configure the neighbor <PE1-IP> weight 33768 command on CE1 under the BGP process.
B.    Configure the distance bgp 115 200 200 command on CE1 under the BGP process.
C.    Configure the distance 30 ip command on CE1 under the IS-IS process.
D.    Configure the distance bgp 115 200 200 command on CE2 under the BGP process.
E.    Configure the neighbor <PE1-IP> weight 33768 command on CE2 under the BGP process.

Answer: A

Which information is carried in the OSPFv3 intra-area Prefix LSA?

A.    All link-local addresses
B.    All IPv6 prefix and topology information that OSPFv2 included in Router LSA and Network LSA
C.    List of options associated with the link to all other routers attached to the link
D.    All prefix-specific information that OSPFv2 included in Router LSA and Network LSA

Answer: D
OSPFv3’s new LSA, the Intra-area Prefix LSA (type 9), handles intra-area network information that was previously included in OSPFv2 type 2 LSAs. It is used in order to advertise one or more IPv6 prefixes. The prefixes are associated with router segment, stub network segment or transit network segment. Intra-area prefix LSAs (type 9) & Inter-Area- Prefix-LSA (type 3) carry all IPv6 prefix information, which, in IPv4, is included in router LSAs and network LSAs.

Drag and Drop Questions




Drag and Drop Questions




The Attribute field within the IS-IS LSP header contains which of the following flags? (Choose four)

A.    IS-Type
B.    Overload (LSPDBOL)
C.    Pseudonode (PN)
D.    Attached (ATT)
E.    Fragment (Frag-Nr)
F.    Partition (P)

Answer: ABDF

Which of the following are steps to configure destination-based Remote Triggered Black Hole (RTBH) filtering? (Choose three.)

A.    Configure BGP between trigger and black hole routers.
B.    Configure OSPF between trigger router and black hole routes
C.    Configure all edge routers with static (reserved) host route to Null0
D.    Configure on trigger router to advertise victim host route with community
E.    Activate black hole by redistributing route for victim into BGP with next-hop set to the static (reserved) hostroute configured on edge routers.

Answer: ACE

Which four services use the inner labels of an MPLS label stack? (Choose four)

B.    switching path in MPLS core
C.    Cisco MPLS Traffic Engineering and Fast Reroute
D.    MPLS over ATM
E.    VPN over Traffic Engineering core
F.    any transport over MPLS

Answer: ACEF

What BGP feature improves on DDOS mitigation by allowing instructions that are more granular and allow for source address, destination, address, L4 details, and packet specifics to be analyzed?

A.    RCMD
B.    RTBH
C.    BGP Flowspec
D.    BGPSec

Answer: C

In which of the following BGP-related events is an End-of-RIB (EOR) message sent? (Choose two.)

A.    Following a link flap in the BGP speaker’s AS
B.    During initial convergence.
C.    Following a Route Processor Switchover.
D.    Just before sending a CEASE message to tear down the session.
E.    During capability negotiation

Answer: BC

Which description of BGP authentication is true?

A.    MD5 has been used by BGP to encrypt BGP update packets.
B.    BGP uses a message-digest algorithm to authenticate BGP peers
C.    A plain-text password authentication is an option of BGP authentication
D.    EBGP peers authentication is faster than IBGP peers authentication
E.    BGP uses public key and private key to authenticate BGP peers.

Answer: B
BGP Authentication
BGP supports MD5 authentication between neighbors, using a shared password. It is configured under BGP router configuration mode with the command neighbor {ip-address | peer-group-name} password password.
When authentication is configured, BGP authenticates every TCP segment from its peer and checks the source of each routing update. Most ISPs require authentication for their EBGP peers.

Refer to the exhibit. A network engineer must configure BFD for IS-IS between R1 and R2. In case the primary link fails, the convergence time should be less than a second.
Which two IOS commands are required to meet this requirement? (Choose two.)


A.    isis bfd
B.    bfd minimum-interval 250
C.    bfd interval 250 min_rx 250 multiplier 3
D.    bfd multiplier 3
E.    bfd interval 250 min_rx 250 multiplier 4
F.    bfd fast-detect ipv4

Answer: AC

Refer to the exhibit. The referenced TE tunnels compete for bandwidth requirements over the limited available bandwidth that is provisioned. Which core MPLS component erases a conflict and provides admission control for any new added TE tunnel?


A.    link management
B.    link attributes
C.    MPLS TE priorities
D.    RSVP

Answer: C
TE Priority allows you to give setup priority to tunnels.

Refer to the exhibit. OSPFv3 is already running, and R1 has added a new subnet (loopback 11). What is the reason code on R4 when executing the command show ipv6 ospf statistics?


A.    P (partial)
B.    N (network)
C.    R (router)
D.    L (link)

Answer: C

Which are the two fundamental ways in which IEEE 1588 differs from SyncE? (Choose two.)

A.    In addition to frequency synchronization, it achieves ToD synchronization to achieve phase alignment which is required for multi-channel communication.
B.    It is a purely-based solution, with the actual clock values being passed inside the payloads of special packets dedicated to that task.
C.    It offers two major changes over traditional Ethernet to make it suitable for clock distribution: a mandated clock accuracy and the ESMC protocol for clock selection, distribution, management, traceability, and failover.
D.    SyncE is a Cisco proprietary ToD technology where IEEE 1588 is a industry standard recommended for interoperability across vendor devices.
E.    IEEE 1588 applies to voice-only systems or with low-bandwidth data traffic.

Answer: AB

What are the four key design requirements for mobile IP backhaul? (Choose four.)

A.    X2 interface turning point
B.    bandwidth
C.    Layer 2 Tunneling
D.    native IPv6 support
E.    DiffServ QoS
F.    MPLS-enabled interface
G.    network timing distribution and recovery
H.    mandatory Layer 3 access up to a cell site

Answer: CDGH

Refer to the exhibit. The Service Provider does not have IPv6 support in the core, however it does have MPLS support. Customer requires IPv6 connectivity in all sites including Internet access. Without a requirement to create VRF, which method is preferred to support IPv6 traffic between these sites?


A.    6VPE
B.    H-VPLS
C.    L2TPv3
D.    VPLS
E.    6CE
F.    6PE

Answer: F

Which 4 statements regarding MPLS Label Stack Encoding is true?

A.    A value of 4 represents the “Implicit NULL Label.”
B.    A value of 0 represents the “IPv4 Explicit NULL Label.”
C.    A value of 1 represents the “Router Alert Label”.
D.    A value of 2 represents the “IPv6 Explicit NULL Label”
E.    A value of 1 represents the “IPv1 Explicit NULL Label”
F.    A value of 3 represents the “Implicit NULL Label”

Answer: BCDF
A value of 0 represents the “IPv4 Explicit NULL Label”. This label indicates that the label stack must be popped, and the packet forwarding must be based on the IPv4 header. This helps to keep Exp bits safe until the egress router. It is used in MPLS based QoS. A value of 1 represents the “Router Alert Label”. When a received packet contains this label value at the top of the label stack, it is delivered to a local software module for processing. The actual packet forwarding is determined by the label beneath it in the stack. However, if the packet is forwarded further, the Router Alert Label should be pushed back onto the label stack before forwarding. The use of this label is analogous to the use of the “Router Alert Option” in IP packets (for example, ping with record route option)
A value of 2 represents the “IPv6 Explicit NULL Label”. It indicates that the label stack must be popped, and the packet forwarding must be based on the IPv6 header. A value of 3 represents the “Implicit NULL Label”. This is a label that an LSR can assign and distribute.
However, it never actually appears in the encapsulation. It indicates that the LSR pops the top label from the stack and forwards the rest of the packet (labeled or unlabeled) through the outgoing interface (as per the entry in Lfib). Although this value might never appear in the encapsulation, it needs to be specified in the Label Distribution Protocol, so a value is reserved.

The 400-201 online practice test prepare you according to the real exam scenario. Free demo is available to check before buying the 400-201 study guide.

400-201 new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDVkJyT2NGdVo1WWs

2017 Cisco 400-201 exam dumps (All 647 Q&As) from Lead2pass:

https://www.lead2pass.com/400-201.html [100% Exam Pass Guaranteed]