400-101 Exam - CCIE Routing and Switching (v5.0)

certleader.com

Q1. Which two hashing algorithms can be used when configuring SNMPv3? (Choose two.) 

A. MD5 

B. SHA-1 

C. Blowfish 

D. DES 

E. AES 

F. SSL 

Answer: A,B 

Explanation: 

Note that SNMPv3 does not send passwords in clear-text and uses hash-based authentication with either MD5 or SHA1 functions (HMAC authentication – the packet conted is hashed along with authentication key to produce the authentication string). 

Reference: http://blog.ine.com/2008/07/19/snmpv3-tutorial/ 

Q2. Which two actions can you take to allow the greatest number of pertinent packets to be stored in the temporary buffer of Cisco IOS Embedded Packet Capture? (Choose two.) 

A. Specify the sampling interval. 

B. Specify the capture buffer type. 

C. Specify a reflexive ACL. 

D. Specify the minimum packet capture rate. 

E. Specify the packet size. 

F. Store the capture simultaneously onto an external memory card as the capture occurs. 

Answer: A,B 

Explanation: 

Embedded Packet Capture (EPC) provides an embedded systems management facility that helps in tracing and troubleshooting packets. This feature allows network administrators to capture data packets flowing through, to, and from a Cisco device. The network administrator may define the capture buffer size and type (circular, or linear) and the maximum number of bytes of each packet to capture. The packet capture rate can be throttled using further administrative controls. For example, options allow for filtering the packets to be captured using an Access Control List and, optionally, further defined by specifying a maximum packet capture rate or by specifying a sampling interval. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/epc/configuration/xe-3s/asr1000/epc-xe-3s-asr1000-book/nm-packet-capture-xe.html 

Q3. Refer to the exhibit. 

If the downstream router has a summary route configured, which two actions must you take on the local router to create the summary route that summarizes all routes from the downstream router? (Choose two.) 

A. Configure the summary address on the interface. 

B. Use 10.0.0.0 255.248.0.0 as the summary route. 

C. Configure the summary address in the EIGRP process. 

D. Use 10.0.0.0 255.252.0.0 as the summary route. 

E. Configure a route map to permit the route. 

F. Configure a distribute list in. 

Answer: A,B 

Explanation: 

Route summarization works in conjunction with the ip summary-address eigrp interface configuration command, in which additional summarization can be performed. To correctly summarize all the networks shown, the correct route to use is 10.0.0.0 255.248.0.0 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/ip/configuration/guide/fipr_c/1cfeigrp.html 

Q4. Which variable in an EEM applet is set when you use the sync yes option? 

A. $_cli_result 

B. $_result 

C. $_string_result 

D. $_exit_status 

Answer:

Explanation: 

The CLI event detector screens CLI commands for a regular expression match. When a match is found, an event is published. The match logic is performed on the fully expanded CLI command after the command is successfully parsed and before it is executed. The CLI event detector supports three publish modes: 

. Synchronous publishing of CLI events--The CLI command is not executed until the EEM policy exits, and the EEM policy can control whether the command is executed. The read/write variable, _exit_status, allows you to set the exit status at policy exit for policies triggered from synchronous events. If _exit_status is 0, the command is skipped, if _exit_status is 1, the command is run. 

. Asynchronous publishing of CLI events--The CLI event is published, and then the CLI command is executed. 

. Asynchronous publishing of CLI events with command skipping--The CLI event is published, but the CLI command is not executed. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/eem/command/eem-cr-

book/eem-cr-e1.html 

Q5. DRAG DROP 

Answer:  

Q6. Refer to the exhibit. 

Which two statements about this configuration are true? (Choose two.) 

A. Pings from SW2 to SW1 fail because SW1 is pruning VLAN 10. 

B. VLANs 10 and 200 are added to the SW2 allowed list on interface fa0/22. 

C. Pings from SW2 to SW1 are successful. 

D. Only VLAN 200 is added to the SW1 allowed list on interface fa0/22. 

Answer: B,C 

Q7. Under Cisco IOS Software, which two features are supported in RADIUS Change of Authorization requests? (Choose two.) 

A. session identification 

B. session reauthentication 

C. session termination 

D. host termination 

Answer: A,C 

Explanation: 

CoA requests, as described in RFC 5176, are used in a pushed model to allow for session identification, host reauthentication, and session termination. The model comprises one request (CoA-Request) and two possible response codes. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/15-sy/sec-usr-aaa-15-sy-book/sec-rad-coa.html 

Q8. Which three statements are true about VSS? (Choose three.) 

A. VSS separates the control planes of the active and the standby chassis. 

B. Configuration changes can be made on both active and standby chassis. 

C. When the VSS active chassis recovers after a failure, it initiates a switchover and takes on the active role again. 

D. VSS unifies the control planes of the active and the standby chassis. 

E. HSRP configuration is not required to run VSS. 

F. The VSS standby chassis monitors the VSS active chassis using the VSL. 

Answer: D,E,F 

Explanation: 

VSS operates on a unified control plane with a distributed forwarding architecture in which the active supervisor (or switch) is responsible for actively participating with the rest of the network and for managing and maintaining control plane information. VSS actually removes the need for a next-hop redundancy protocol like HSRP or VRRP. These first-hop redundancy protocols are usually heavily tied to a fast-converging routing protocol like EIGRP, and still require that each device maintain its own control plane. The standby chassis monitors the active chassis using the VSL. If it detects failure, the standby chassis initiates a switchover and takes on the active role. When the failed chassis recovers, it takes on the standby role. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/config_guide/sup2T/15_1_sy_swcg_2T/virtual_switching_systems.pdf 

Q9. Which two modes of operation does BFD support? (Choose two.) 

A. synchronous mode 

B. asynchronous mode 

C. demand mode 

D. echo mode 

E. aggressive mode 

F. passive mode 

Answer: B,C 

Explanation: 

A session may operate in one of two modes: asynchronous mode and demand mode. In 

asynchronous mode, both endpoints periodically send Hello packets to each other. If a number of those packets are not received, the session is considered down. In demand mode, no Hello packets are exchanged after the session is established; it is assumed that the endpoints have another way to verify connectivity to each other, perhaps on the underlying physical layer. However, either host may still send Hello packets if needed. 

Reference: http://en.wikipedia.org/wiki/Bidirectional_Forwarding_Detection 

Q10. Which two statements about SNMP traps are true? (Choose two.) 

A. They are sent by an agent after a specified event. 

B. They are sent when solicited after a specified event. 

C. They are equivalent to a community string. 

D. They provide solicited data to the manager. 

E. They are sent by a management station to an agent. 

F. Vendor-specific traps can be configured. 

Answer: A,F 

Explanation: 

The SNMP agent contains MIB variables whose values the SNMP manager can request or change. A manager can get a value from an agent or store a value into the agent. The agent gathers data from the MIB, the repository for information about device parameters and network data. The agent can also respond to a manager's requests to get or set data. An agent can send unsolicited traps to the manager. Traps are messages alerting the SNMP manager to a condition on the network. Traps can mean improper user authentication, restarts, link status (up or down), MAC address tracking, closing of a TCP connection, loss of connection to a neighbor, or other significant events. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_55_se/configuration/guide/scg_2960/swsnmp.html