성공을 위해 길을 찾고 실패를 위해 구실을 찾지 않는다는 말이 있습니다.Cisco 400-101 (CCIE Routing and Switching Written Exam v5.0) 시험이 영어로 출제되어 시험패스가 너무 어렵다 혹은 회사다니느라 공부할 시간이 없다는 등등은 모두 공부하기싫은 구실에 불과합니다. Pass4Test의 Cisco 400-101 (CCIE Routing and Switching Written Exam v5.0) 덤프만 마련하면 실패를 성공으로 바꿀수 있는 기적을 체험할수 있습니다.
NO.1 Which mechanism can be used on Layer 2 switches so that only multicast
packets with
downstream receivers are sent on the multicast router-connected
ports?
A. IGMP snooping
B. Router Guard
C. PIM snooping
D. multicast
filtering
Answer: C
NO.2 In a nonbackbone OSPF area, all traffic that
is destined to the Internet is routed by using a
default route that is
originated by the ABR. Which change in the configuration of the OSPF area
type
causes traffic from that area that is destined to the Internet to be
dropped?
A. The OSPF area changes from NSSA to totally stubby area.
B. The
OSPF area changes from NSSA to regular area.
C. The OSPF area changes from
stub area to totally stubby area.
D. The OSPF area changes from stub area to
NSSA.
Answer: D
NO.3 By default, how does a GET VPN group member
router handle traffic when it is unable to
register to a key server?
A.
All traffic is queued until registration is successful or the queue is
full.
B. All traffic is forwarded through the router unencrypted.
C. All
traffic is forwarded through the router encrypted.
D. All traffic through the
router is dropped.
Answer: B
NO.4 When EIGRP is used as the IPv4 PE-CE
protocol, which two requirements must be configured
before the BGP IPv4
address family can be configured? (Choose two.)
A. the route
distinguisher
B. the virtual routing and forwarding instance
C. the
loopback interface
D. the router ID
Answer: A,B
NO.5 Which three
statements about EVCs are true? (Choose three.)
A. Spanning Tree must use MST
mode on EVC ports.
B. PAGP is supported on EVC ports.
C. Spanning Tree
must use RSTP mode on EVC ports.
D. LACP is supported on EVC ports.
E.
Layer 2 multicast framing is supported.
F. Bridge domain routing is
required.
Answer: A,B,D
NO.6 In GETVPN, which key is used to secure
the control plane?
A. Traffic Encryption Key (TEK)
B. content encryption
key (CEK)
C. message encryption key (MEK)
D. Key Encryption Key
(KEK).
Answer: D
NO.7 Refer to the exhibit.
Which two corrective
actions could you take if EIGRP routes from R2 fail to reach R1? (Choose
two.)
A. Configure R2 to use a VRF to send routes to R1.
B. Configure the
autonomous system in the EIGRP configuration of R1.
C. Correct the network
statement on R2.
D. Add the interface on R1 that is connected to R2 into a
VRF.
Answer: B,D
NO.8 Refer to the exhibit.
Which two statements
about the device that generated the output are true? (Choose two.)
A. The
SPT-bit is set.
B. The sparse-mode flag is set.
C. The RP-bit is
set.
D. The source-specific host report was received.
Answer: A,D