400-101 Exam - CCIE Routing and Switching (v5.0)

certleader.com

Q1. In a PfR environment, which two statements best describe the difference between active mode monitoring and fast mode monitoring? (Choose two.) 

A. Active mode monitoring can monitor and measure actual traffic via NetFlow data collection. 

B. Fast mode monitoring can measure bursty traffic better than active mode. 

C. Active mode monitoring uses IP SLA probes for the purpose of obtaining performance characteristics of the current WAN exit link. 

D. Fast mode monitoring uses IP SLA probes via all valid exits continuously to quickly determine an alternate exit link. 

Answer: C,D 

Explanation: 

Active Monitoring 

PfR uses Cisco IOS IP Service Level Agreements (SLAs) to enable active monitoring. IP SLAs support is enabled by default. IP SLAs support allows PfR to be configured to send active probes to target IP addresses to measure the jitter and delay, determining if a prefix is out-of-policy and if the best exit is selected. The border router collects these performance statistics from the active probe and transmits this information to the master controller. 

Fast Failover Monitoring 

Fast failover monitoring enables passive and active monitoring and sets the active probes to continuously monitor all the exits (probe-all). Fast failover monitoring can be used with all types of active probes: Internet Control Message Protocol (ICMP) echo, jitter, TCP connection, and UDP echo. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/pfr/command/pfr-cr-book/pfr-s1.html 

Q2. Refer to the exhibit. 

Which three statements about the output are true? (Choose three.) 

A. This switch is currently receiving a multicast data stream that is being forwarded out VLAN 150. 

B. A multicast receiver has requested to join one or more of the multicast groups. 

C. Group 224.0.1.40 is a reserved address, and it should not be used for multicast user data transfer. 

D. One or more multicast groups are operating in PIM dense mode. 

E. One or more of the multicast data streams will be forwarded out to neighbor 10.85.20.20. 

F. Group 239.192.1.1 is a reserved address, and it should not be used for multicast user data transfer. 

Answer: A,B,C 

Explanation: 

A. VLAN 150 shows up in the outgoing interface list so those specific multicast streams are being forwarded to this VLAN. 

B. A receiver has requested to receive the multicast stream associated with the multicast address of 239.192.1.1, that is why this stream appears in the mroute table. 

C. The 224.0.1.40 is a reserved multicast group for cisco's Rp descovery. All cisco routers are members of this grup by default and listen to this group for Cisco RP discovery messages advertised by mapping agent even if it is not configured 

Q3. What are the three HDLC operating modes? (Choose three.) 

A. normal response 

B. asynchronous balanced 

C. synchronous response 

D. asynchronous response 

E. normal balanced 

F. synchronous balanced 

Answer: A,B,D 

Q4. DRAG DROP 

Drag each routing protocol on the left to the matching statement on the right. 

Answer:  

Q5. Which command drops packets with unknown source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value, and also causes the Security Violation counter to increment? 

A. switchport port-security violation protect 

B. switchport port-security violation drop 

C. switchport port-security violation shutdown 

D. switchport port-security violation restrict 

Answer:

Explanation: 

When configuring port security violation modes, note the following information: 

. protect—Drops packets with unknown source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value. 

. restrict—Drops packets with unknown source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value and causes the SecurityViolation counter to increment. 

. shutdown—Puts the interface into the error-disabled state immediately and sends an SNMP trap notification. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/port_sec.html 

Q6. Which three statements are true about OSPFv3? (Choose three.) 

A. The only method to enable OSPFv3 on an interface is via the interface configuration mode. 

B. Multiple instances of OSPFv3 can be enabled on a single link. 

C. There are two methods to enable OSPFv3 on an interface, either via the interface configuration mode or via the router configuration mode. 

D. For OSPFv3 to function, IPv6 unicast routing must be enabled. 

E. For OSPFv3 to function, IPv6 must be enabled on the interface. 

F. Only one instance of OSPFv3 can be enabled on a single link. 

Answer: B,D,E 

Explanation: 

Here is a list of the differences between OSPFv2 and OSPFv3: 

They use different address families (OSPFv2 is for IPv4-only, OSPFv3 can be used for IPv6-only or both protocols (more on this following)) 

OSPFv3 introduces new LSA types 

OSPFv3 has different packet format 

OSPFv3 uses different flooding scope bits (U/S2/S1) 

OSPFv3 adjacencies are formed over link-local IPv6 communications 

OSPFv3 runs per-link rather than per-subnet 

OSPFv3 supports multiple instances on a single link, Interfaces can have multiple IPv6 addresses 

OSPFv3 uses multicast addresses FF02::5 (all OSPF routers), FF02::6 (all OSPF DRs) 

OSPFv3 Neighbor Authentication done with IPsec (AH) 

OSPFv2 Router ID (RID) must be manually configured, still a 32-bit number 

Following is a simple example of OSPFv3 configuration on a Cisco IOS 12.4T router. 

ipv6 unicast-routing 

ipv6 cef 

interface GigabitEthernet 0/0 

description Area 0.0.0.0 backbone interface 

ipv6 address 2001:DB8:100:1::1/64 

ipv6 ospf network broadcast 

ipv6 ospf 100 area 0.0.0.0 

Reference: http://www.networkworld.com/article/2225270/cisco-subnet/ospfv3-for-ipv4-and-ipv6.html 

Q7. DRAG DROP 

Drag and drop each DHCP term on the left to the corresponding definition on the right. 

Answer:  

Q8. Which statement about the feasibility condition in EIGRP is true? 

A. The prefix is reachable via an EIGRP peer that is in the routing domain of the router. 

B. The EIGRP peer that advertises the prefix to the router has multiple paths to the destination. 

C. The EIGRP peer that advertises the prefix to the router is closer to the destination than the router. 

D. The EIGRP peer that advertises the prefix cannot be used as a next hop to reach the destination. 

Answer:

Explanation: 

The advertised metric from an EIGRP neighbor (peer) to the local router is called Advertised Distance (or reported distance) while the metric from the local router to that network is called Feasible Distance. For example, R1 advertises network 10.10.10.0/24 with a metric of 20 to R2. For R2, this is the advertised distance. R2 calculates the feasible distance by adding the metric from the advertised router (R1) to itself. So in this case the feasible distance to network 10.10.10.0/24 is 20 + 50 = 70. 

Before a router can be considered a feasible successor, it must pass the feasibility condition rule. In short, the feasibility condition says that if we learn about a prefix from a neighbor, the advertised distance from that neighbor to the destination must be lower than our feasible distance to that same destination. Therefore we see the Advertised Distance always smaller than the Feasible Distance to satisfy the feasibility condition. 

Q9. Which two best practices does Cisco recommend to migrate a network from PVST+ to MST? (Choose two.) 

A. Start the migration at the edge nodes and work toward the root bridge. 

B. Before starting the transition, configure one of the edge nodes with a lower priority so that it becomes the root bridge after the transition. 

C. Before starting the transition, ensure that at least two nodes act as the root bridge for all VLANs in the network. 

D. Start the migration at the root bridge and work toward the edge nodes. 

E. Before starting the transition, configure one of the edge nodes with a higher priority so that it becomes the root bridge after the transition. 

F. Before starting the transition, ensure that one node is the root bridge for all VLANs in the network. 

Answer: A,F 

Q10. An engineer has configured a router to use EUI-64, and was asked to document the IPv6 address of the router. The router has the following interface parameters: 

mac address C601.420F.0007 

subnet 2001:DB8:0:1::/64 

A. 2001:DB8:0:1:C601:42FF:FE0F:7 

B. 2001:DB8:0:1:FFFF:C601:420F:7 

C. 2001:DB8:0:1:FE80:C601:420F:7 

D. 2001:DB8:0:1:C601:42FE:800F:7 

Answer: